Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-1629
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T00:10:03.941Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, { tags: [ "x_transferred", ], url: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", }, { name: "FEDORA-2022-8df66cdbef", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/", }, { name: "GLSA-202208-32", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/202208-32", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "GLSA-202305-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/202305-16", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "vim/vim", vendor: "vim", versions: [ { lessThan: "8.2.4925", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126 Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-05-03T00:00:00", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, { url: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", }, { name: "FEDORA-2022-8df66cdbef", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/", }, { name: "GLSA-202208-32", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "GLSA-202305-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/202305-16", }, ], source: { advisory: "e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", discovery: "EXTERNAL", }, title: "Buffer Over-read in function find_next_quote in vim/vim", }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1629", datePublished: "2022-05-10T00:00:00", dateReserved: "2022-05-09T00:00:00", dateUpdated: "2024-08-03T00:10:03.941Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-1629\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2022-05-10T14:15:08.530\",\"lastModified\":\"2024-11-21T06:41:07.860\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution\"},{\"lang\":\"es\",\"value\":\"Una lectura Excesiva del Búfer en la función find_next_quote en el repositorio de GitHub vim/vim versiones anteriores a 8.2.4925. Esta vulnerabilidad es capaz de bloquear el software, Modificar la Memoria y una posible ejecución remota\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":6.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-126\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2.4925\",\"matchCriteriaId\":\"F5C8F600-9685-4DD8-89C7-E3044A94A0BD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.0\",\"matchCriteriaId\":\"71E032AD-F827-4944-9699-BB1E6D4233FC\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd\",\"source\":\"security@huntr.dev\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee\",\"source\":\"security@huntr.dev\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-16\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
fkie_cve-2022-1629
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
vim | vim | * | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 | |
apple | macos | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", matchCriteriaId: "F5C8F600-9685-4DD8-89C7-E3044A94A0BD", versionEndExcluding: "8.2.4925", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", matchCriteriaId: "71E032AD-F827-4944-9699-BB1E6D4233FC", versionEndExcluding: "13.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", }, { lang: "es", value: "Una lectura Excesiva del Búfer en la función find_next_quote en el repositorio de GitHub vim/vim versiones anteriores a 8.2.4925. Esta vulnerabilidad es capaz de bloquear el software, Modificar la Memoria y una posible ejecución remota", }, ], id: "CVE-2022-1629", lastModified: "2024-11-21T06:41:07.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 4.7, source: "security@huntr.dev", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-10T14:15:08.530", references: [ { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { source: "security@huntr.dev", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", }, { source: "security@huntr.dev", tags: [ "Exploit", "Third Party Advisory", ], url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, { source: "security@huntr.dev", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202305-16", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213488", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202305-16", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213488", }, ], sourceIdentifier: "security@huntr.dev", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-126", }, ], source: "security@huntr.dev", type: "Primary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
WID-SEC-W-2022-0126
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in vim ausnutzen, um einen Denial of Service-Zustand zu verursachen, Speicher zu manipulieren und beliebigen Code auszuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- MacOS X\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0126 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0126.json", }, { category: "self", summary: "WID-SEC-2022-0126 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0126", }, { category: "external", summary: "Ubuntu Security Notice USN-5995-1 vom 2023-04-04", url: "https://ubuntu.com/security/notices/USN-5995-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-0958 vom 2023-02-28", url: "http://linux.oracle.com/errata/ELSA-2023-0958.html", }, { category: "external", summary: "Debian Security Advisory DLA-3011 vom 2022-05-17", url: "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html", }, { category: "external", summary: "Huntr.dev PoC CVE-2022-1621", url: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb/", }, { category: "external", summary: "Huntr.dev PoC CVE-2022-1629", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee/", }, { category: "external", summary: "Ubuntu Security Notice USN-5460-1 vom 2022-06-06", url: "https://ubuntu.com/security/notices/USN-5460-1", }, { category: "external", summary: "Red Hat Bugzilla - Bug 2083924 vom 2022-05-10", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "Red Hat Bugzilla - Bug 2083931 vom 2022-05-10", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "external", summary: "Ubuntu Security Notice USN-5498-1 vom 2022-06-30", url: "https://ubuntu.com/security/notices/USN-5498-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:5242 vom 2022-07-01", url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:5319 vom 2022-07-01", url: "https://access.redhat.com/errata/RHSA-2022:5319", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5319 vom 2022-07-01", url: "http://linux.oracle.com/errata/ELSA-2022-5319.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5242 vom 2022-07-01", url: "http://linux.oracle.com/errata/ELSA-2022-5242.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1829 vom 2022-07-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1829.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2022-104 vom 2022-07-25", url: "https://downloads.avaya.com/css/P8/documents/101082924", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1628 vom 2022-08-05", url: "https://alas.aws.amazon.com/ALAS-2022-1628.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-32", }, { category: "external", summary: "Ubuntu Security Notice USN-5613-1 vom 2022-09-15", url: "https://ubuntu.com/security/notices/USN-5613-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5613-2 vom 2022-09-19", url: "https://ubuntu.com/security/notices/USN-5613-2", }, { category: "external", summary: "Debian Security Advisory DLA-3204 vom 2022-11-24", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, ], source_lang: "en-US", title: "vim: Mehrere Schwachstellen", tracking: { current_release_date: "2023-04-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:43.219+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0126", initial_release_date: "2022-05-10T22:00:00.000+00:00", revision_history: [ { date: "2022-05-10T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-05-16T22:00:00.000+00:00", number: "2", summary: "PoC und neue Updates von Debian aufgenommen", }, { date: "2022-06-06T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-30T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu und Red Hat aufgenommen", }, { date: "2022-07-03T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-07-20T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-26T22:00:00.000+00:00", number: "7", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2022-08-04T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-09-15T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-09-19T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-11-23T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Debian aufgenommen", }, { date: "2023-02-28T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2023-04-03T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "14", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_name", name: "Open Source vim < 8.2.4919", product: { name: "Open Source vim < 8.2.4919", product_id: "T023154", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.4919", }, }, }, { category: "product_name", name: "Open Source vim < 8.2.4925", product: { name: "Open Source vim < 8.2.4925", product_id: "T023155", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.4925", }, }, }, ], category: "product_name", name: "vim", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1621", notes: [ { category: "description", text: "In vim existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines Heap-Pufferüberlaufs in \"vim_strncpy find_word\" und einem Pufferüberlauf in \"find_next_quote\". Ein Angreifer kann diese Schwachstellen ausnutzen, um einen 'Denial of Service'-Zustand zu verursachen, Speicher zu manipulieren und beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "T015519", "T015518", "2951", "67646", "T015516", "T000126", "T015127", "398363", "T015126", "T012167", "T004914", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2022-1621", }, { cve: "CVE-2022-1629", notes: [ { category: "description", text: "In vim existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines Heap-Pufferüberlaufs in \"vim_strncpy find_word\" und einem Pufferüberlauf in \"find_next_quote\". Ein Angreifer kann diese Schwachstellen ausnutzen, um einen 'Denial of Service'-Zustand zu verursachen, Speicher zu manipulieren und beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "T015519", "T015518", "2951", "67646", "T015516", "T000126", "T015127", "398363", "T015126", "T012167", "T004914", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2022-1629", }, ], }
wid-sec-w-2022-0126
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in vim ausnutzen, um einen Denial of Service-Zustand zu verursachen, Speicher zu manipulieren und beliebigen Code auszuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- MacOS X\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0126 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0126.json", }, { category: "self", summary: "WID-SEC-2022-0126 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0126", }, { category: "external", summary: "Ubuntu Security Notice USN-5995-1 vom 2023-04-04", url: "https://ubuntu.com/security/notices/USN-5995-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-0958 vom 2023-02-28", url: "http://linux.oracle.com/errata/ELSA-2023-0958.html", }, { category: "external", summary: "Debian Security Advisory DLA-3011 vom 2022-05-17", url: "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html", }, { category: "external", summary: "Huntr.dev PoC CVE-2022-1621", url: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb/", }, { category: "external", summary: "Huntr.dev PoC CVE-2022-1629", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee/", }, { category: "external", summary: "Ubuntu Security Notice USN-5460-1 vom 2022-06-06", url: "https://ubuntu.com/security/notices/USN-5460-1", }, { category: "external", summary: "Red Hat Bugzilla - Bug 2083924 vom 2022-05-10", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "Red Hat Bugzilla - Bug 2083931 vom 2022-05-10", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "external", summary: "Ubuntu Security Notice USN-5498-1 vom 2022-06-30", url: "https://ubuntu.com/security/notices/USN-5498-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:5242 vom 2022-07-01", url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:5319 vom 2022-07-01", url: "https://access.redhat.com/errata/RHSA-2022:5319", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5319 vom 2022-07-01", url: "http://linux.oracle.com/errata/ELSA-2022-5319.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5242 vom 2022-07-01", url: "http://linux.oracle.com/errata/ELSA-2022-5242.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1829 vom 2022-07-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1829.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2022-104 vom 2022-07-25", url: "https://downloads.avaya.com/css/P8/documents/101082924", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1628 vom 2022-08-05", url: "https://alas.aws.amazon.com/ALAS-2022-1628.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-32", }, { category: "external", summary: "Ubuntu Security Notice USN-5613-1 vom 2022-09-15", url: "https://ubuntu.com/security/notices/USN-5613-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5613-2 vom 2022-09-19", url: "https://ubuntu.com/security/notices/USN-5613-2", }, { category: "external", summary: "Debian Security Advisory DLA-3204 vom 2022-11-24", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, ], source_lang: "en-US", title: "vim: Mehrere Schwachstellen", tracking: { current_release_date: "2023-04-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:43.219+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0126", initial_release_date: "2022-05-10T22:00:00.000+00:00", revision_history: [ { date: "2022-05-10T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-05-16T22:00:00.000+00:00", number: "2", summary: "PoC und neue Updates von Debian aufgenommen", }, { date: "2022-06-06T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-30T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu und Red Hat aufgenommen", }, { date: "2022-07-03T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-07-20T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-26T22:00:00.000+00:00", number: "7", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2022-08-04T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-09-15T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-09-19T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-11-23T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Debian aufgenommen", }, { date: "2023-02-28T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2023-04-03T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "14", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_name", name: "Open Source vim < 8.2.4919", product: { name: "Open Source vim < 8.2.4919", product_id: "T023154", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.4919", }, }, }, { category: "product_name", name: "Open Source vim < 8.2.4925", product: { name: "Open Source vim < 8.2.4925", product_id: "T023155", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.4925", }, }, }, ], category: "product_name", name: "vim", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1621", notes: [ { category: "description", text: "In vim existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines Heap-Pufferüberlaufs in \"vim_strncpy find_word\" und einem Pufferüberlauf in \"find_next_quote\". Ein Angreifer kann diese Schwachstellen ausnutzen, um einen 'Denial of Service'-Zustand zu verursachen, Speicher zu manipulieren und beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "T015519", "T015518", "2951", "67646", "T015516", "T000126", "T015127", "398363", "T015126", "T012167", "T004914", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2022-1621", }, { cve: "CVE-2022-1629", notes: [ { category: "description", text: "In vim existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines Heap-Pufferüberlaufs in \"vim_strncpy find_word\" und einem Pufferüberlauf in \"find_next_quote\". Ein Angreifer kann diese Schwachstellen ausnutzen, um einen 'Denial of Service'-Zustand zu verursachen, Speicher zu manipulieren und beliebigen Code auszuführen.", }, ], product_status: { known_affected: [ "T015519", "T015518", "2951", "67646", "T015516", "T000126", "T015127", "398363", "T015126", "T012167", "T004914", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2022-1629", }, ], }
wid-sec-w-2022-1846
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1846 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1846.json", }, { category: "self", summary: "WID-SEC-2022-1846 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1846", }, { category: "external", summary: "Apple Security Advisory HT213488 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213488", }, { category: "external", summary: "Apple Security Advisory HT213493 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213493", }, { category: "external", summary: "Apple Security Advisory HT213494 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213494", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-09-16T22:00:00.000+00:00", generator: { date: "2024-09-17T08:17:03.625+00:00", engine: { name: "BSI-WID", version: "1.3.6", }, }, id: "WID-SEC-W-2022-1846", initial_release_date: "2022-10-24T22:00:00.000+00:00", revision_history: [ { date: "2022-10-24T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-10-27T22:00:00.000+00:00", number: "2", summary: "CVEs ergänzt", }, { date: "2023-06-27T22:00:00.000+00:00", number: "3", summary: "CVE's ergänzt", }, { date: "2023-08-14T22:00:00.000+00:00", number: "4", summary: "CVE Nummern ergänzt", }, { date: "2024-06-10T22:00:00.000+00:00", number: "5", summary: "CVE's ergänzt", }, { date: "2024-09-16T22:00:00.000+00:00", number: "6", summary: "CVE-2022-46723 ergänzt", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "Ventura_13", product: { name: "Apple macOS Ventura_13", product_id: "T025102", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:ventura_13", }, }, }, { category: "product_version", name: "Big Sur 11.7.1", product: { name: "Apple macOS Big Sur 11.7.1", product_id: "T025103", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur_11.7.1", }, }, }, { category: "product_version", name: "Monterey 12.6.1", product: { name: "Apple macOS Monterey 12.6.1", product_id: "T025104", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey_12.6.1", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-39537", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-39537", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0368", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0368", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0943", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0943", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1621", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1621", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1629", }, { cve: "CVE-2022-1674", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1674", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1725", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1725", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1769", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1769", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1942", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1942", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-2000", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2000", }, { cve: "CVE-2022-2042", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2042", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-26699", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26699", }, { cve: "CVE-2022-26730", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26730", }, { cve: "CVE-2022-28739", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-28739", }, { cve: "CVE-2022-29458", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-29458", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32827", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32827", }, { cve: "CVE-2022-32835", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32835", }, { cve: "CVE-2022-32858", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32858", }, { cve: "CVE-2022-32859", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32859", }, { cve: "CVE-2022-32862", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32862", }, { cve: "CVE-2022-32864", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32864", }, { cve: "CVE-2022-32865", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32865", }, { cve: "CVE-2022-32866", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32866", }, { cve: "CVE-2022-32867", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32867", }, { cve: "CVE-2022-32870", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32870", }, { cve: "CVE-2022-32875", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32875", }, { cve: "CVE-2022-32876", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32876", }, { cve: "CVE-2022-32877", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32877", }, { cve: "CVE-2022-32879", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32879", }, { cve: "CVE-2022-32881", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32881", }, { cve: "CVE-2022-32883", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32883", }, { cve: "CVE-2022-32886", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32886", }, { cve: "CVE-2022-32888", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32888", }, { cve: "CVE-2022-32890", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32890", }, { cve: "CVE-2022-32892", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32892", }, { cve: "CVE-2022-32895", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32895", }, { cve: "CVE-2022-32898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32898", }, { cve: "CVE-2022-32899", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32899", }, { cve: "CVE-2022-32902", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32902", }, { cve: "CVE-2022-32903", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32903", }, { cve: "CVE-2022-32904", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32904", }, { cve: "CVE-2022-32905", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32905", }, { cve: "CVE-2022-32907", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32907", }, { cve: "CVE-2022-32908", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32908", }, { cve: "CVE-2022-32909", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32909", }, { cve: "CVE-2022-32911", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32911", }, { cve: "CVE-2022-32912", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32912", }, { cve: "CVE-2022-32913", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32913", }, { cve: "CVE-2022-32914", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32914", }, { cve: "CVE-2022-32915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32915", }, { cve: "CVE-2022-32918", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32918", }, { cve: "CVE-2022-32922", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32922", }, { cve: "CVE-2022-32924", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32924", }, { cve: "CVE-2022-32928", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32928", }, { cve: "CVE-2022-32934", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32934", }, { cve: "CVE-2022-32936", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32936", }, { cve: "CVE-2022-32938", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32938", }, { cve: "CVE-2022-32940", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32940", }, { cve: "CVE-2022-32947", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32947", }, { cve: "CVE-2022-42788", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42788", }, { cve: "CVE-2022-42789", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42789", }, { cve: "CVE-2022-42790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42790", }, { cve: "CVE-2022-42791", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42791", }, { cve: "CVE-2022-42793", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42793", }, { cve: "CVE-2022-42795", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42795", }, { cve: "CVE-2022-42796", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42796", }, { cve: "CVE-2022-42799", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42799", }, { cve: "CVE-2022-42806", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42806", }, { cve: "CVE-2022-42808", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42808", }, { cve: "CVE-2022-42809", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42809", }, { cve: "CVE-2022-42811", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42811", }, { cve: "CVE-2022-42813", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42813", }, { cve: "CVE-2022-42814", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42814", }, { cve: "CVE-2022-42815", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42815", }, { cve: "CVE-2022-42818", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42818", }, { cve: "CVE-2022-42819", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42819", }, { cve: "CVE-2022-42820", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42820", }, { cve: "CVE-2022-42823", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42823", }, { cve: "CVE-2022-42824", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42824", }, { cve: "CVE-2022-42825", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42825", }, { cve: "CVE-2022-42828", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42828", }, { cve: "CVE-2022-42829", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42829", }, { cve: "CVE-2022-42830", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42830", }, { cve: "CVE-2022-42831", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42831", }, { cve: "CVE-2022-42832", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42832", }, { cve: "CVE-2022-42833", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42833", }, { cve: "CVE-2022-42834", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42834", }, { cve: "CVE-2022-42838", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42838", }, { cve: "CVE-2022-42860", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42860", }, { cve: "CVE-2022-46709", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46709", }, { cve: "CVE-2022-46712", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46712", }, { cve: "CVE-2022-46713", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46713", }, { cve: "CVE-2022-46721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46721", }, { cve: "CVE-2022-46722", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46722", }, { cve: "CVE-2022-46723", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46723", }, { cve: "CVE-2022-47915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47915", }, { cve: "CVE-2022-47965", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47965", }, { cve: "CVE-2022-48504", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48504", }, { cve: "CVE-2022-48505", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48505", }, { cve: "CVE-2022-48577", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48577", }, { cve: "CVE-2022-48683", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48683", }, ], }
WID-SEC-W-2022-1846
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1846 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1846.json", }, { category: "self", summary: "WID-SEC-2022-1846 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1846", }, { category: "external", summary: "Apple Security Advisory HT213488 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213488", }, { category: "external", summary: "Apple Security Advisory HT213493 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213493", }, { category: "external", summary: "Apple Security Advisory HT213494 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213494", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-09-16T22:00:00.000+00:00", generator: { date: "2024-09-17T08:17:03.625+00:00", engine: { name: "BSI-WID", version: "1.3.6", }, }, id: "WID-SEC-W-2022-1846", initial_release_date: "2022-10-24T22:00:00.000+00:00", revision_history: [ { date: "2022-10-24T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-10-27T22:00:00.000+00:00", number: "2", summary: "CVEs ergänzt", }, { date: "2023-06-27T22:00:00.000+00:00", number: "3", summary: "CVE's ergänzt", }, { date: "2023-08-14T22:00:00.000+00:00", number: "4", summary: "CVE Nummern ergänzt", }, { date: "2024-06-10T22:00:00.000+00:00", number: "5", summary: "CVE's ergänzt", }, { date: "2024-09-16T22:00:00.000+00:00", number: "6", summary: "CVE-2022-46723 ergänzt", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "Ventura_13", product: { name: "Apple macOS Ventura_13", product_id: "T025102", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:ventura_13", }, }, }, { category: "product_version", name: "Big Sur 11.7.1", product: { name: "Apple macOS Big Sur 11.7.1", product_id: "T025103", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur_11.7.1", }, }, }, { category: "product_version", name: "Monterey 12.6.1", product: { name: "Apple macOS Monterey 12.6.1", product_id: "T025104", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey_12.6.1", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-39537", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-39537", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0368", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0368", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0943", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0943", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1621", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1621", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1629", }, { cve: "CVE-2022-1674", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1674", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1725", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1725", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1769", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1769", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1942", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1942", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-2000", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2000", }, { cve: "CVE-2022-2042", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2042", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-26699", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26699", }, { cve: "CVE-2022-26730", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26730", }, { cve: "CVE-2022-28739", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-28739", }, { cve: "CVE-2022-29458", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-29458", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32827", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32827", }, { cve: "CVE-2022-32835", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32835", }, { cve: "CVE-2022-32858", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32858", }, { cve: "CVE-2022-32859", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32859", }, { cve: "CVE-2022-32862", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32862", }, { cve: "CVE-2022-32864", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32864", }, { cve: "CVE-2022-32865", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32865", }, { cve: "CVE-2022-32866", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32866", }, { cve: "CVE-2022-32867", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32867", }, { cve: "CVE-2022-32870", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32870", }, { cve: "CVE-2022-32875", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32875", }, { cve: "CVE-2022-32876", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32876", }, { cve: "CVE-2022-32877", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32877", }, { cve: "CVE-2022-32879", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32879", }, { cve: "CVE-2022-32881", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32881", }, { cve: "CVE-2022-32883", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32883", }, { cve: "CVE-2022-32886", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32886", }, { cve: "CVE-2022-32888", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32888", }, { cve: "CVE-2022-32890", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32890", }, { cve: "CVE-2022-32892", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32892", }, { cve: "CVE-2022-32895", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32895", }, { cve: "CVE-2022-32898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32898", }, { cve: "CVE-2022-32899", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32899", }, { cve: "CVE-2022-32902", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32902", }, { cve: "CVE-2022-32903", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32903", }, { cve: "CVE-2022-32904", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32904", }, { cve: "CVE-2022-32905", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32905", }, { cve: "CVE-2022-32907", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32907", }, { cve: "CVE-2022-32908", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32908", }, { cve: "CVE-2022-32909", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32909", }, { cve: "CVE-2022-32911", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32911", }, { cve: "CVE-2022-32912", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32912", }, { cve: "CVE-2022-32913", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32913", }, { cve: "CVE-2022-32914", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32914", }, { cve: "CVE-2022-32915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32915", }, { cve: "CVE-2022-32918", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32918", }, { cve: "CVE-2022-32922", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32922", }, { cve: "CVE-2022-32924", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32924", }, { cve: "CVE-2022-32928", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32928", }, { cve: "CVE-2022-32934", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32934", }, { cve: "CVE-2022-32936", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32936", }, { cve: "CVE-2022-32938", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32938", }, { cve: "CVE-2022-32940", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32940", }, { cve: "CVE-2022-32947", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32947", }, { cve: "CVE-2022-42788", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42788", }, { cve: "CVE-2022-42789", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42789", }, { cve: "CVE-2022-42790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42790", }, { cve: "CVE-2022-42791", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42791", }, { cve: "CVE-2022-42793", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42793", }, { cve: "CVE-2022-42795", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42795", }, { cve: "CVE-2022-42796", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42796", }, { cve: "CVE-2022-42799", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42799", }, { cve: "CVE-2022-42806", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42806", }, { cve: "CVE-2022-42808", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42808", }, { cve: "CVE-2022-42809", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42809", }, { cve: "CVE-2022-42811", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42811", }, { cve: "CVE-2022-42813", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42813", }, { cve: "CVE-2022-42814", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42814", }, { cve: "CVE-2022-42815", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42815", }, { cve: "CVE-2022-42818", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42818", }, { cve: "CVE-2022-42819", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42819", }, { cve: "CVE-2022-42820", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42820", }, { cve: "CVE-2022-42823", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42823", }, { cve: "CVE-2022-42824", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42824", }, { cve: "CVE-2022-42825", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42825", }, { cve: "CVE-2022-42828", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42828", }, { cve: "CVE-2022-42829", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42829", }, { cve: "CVE-2022-42830", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42830", }, { cve: "CVE-2022-42831", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42831", }, { cve: "CVE-2022-42832", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42832", }, { cve: "CVE-2022-42833", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42833", }, { cve: "CVE-2022-42834", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42834", }, { cve: "CVE-2022-42838", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42838", }, { cve: "CVE-2022-42860", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42860", }, { cve: "CVE-2022-46709", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46709", }, { cve: "CVE-2022-46712", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46712", }, { cve: "CVE-2022-46713", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46713", }, { cve: "CVE-2022-46721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46721", }, { cve: "CVE-2022-46722", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46722", }, { cve: "CVE-2022-46723", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46723", }, { cve: "CVE-2022-47915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47915", }, { cve: "CVE-2022-47965", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47965", }, { cve: "CVE-2022-48504", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48504", }, { cve: "CVE-2022-48505", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48505", }, { cve: "CVE-2022-48577", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48577", }, { cve: "CVE-2022-48683", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48683", }, ], }
rhsa-2022_5319
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: heap buffer overflow (CVE-2022-1621)\n\n* vim: buffer over-read (CVE-2022-1629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5319", url: "https://access.redhat.com/errata/RHSA-2022:5319", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5319.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:07:31+00:00", generator: { date: "2024-11-22T19:07:31+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5319", initial_release_date: "2022-06-30T21:04:06+00:00", revision_history: [ { date: "2022-06-30T21:04:06+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-30T21:04:06+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:07:31+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product: { name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4", product_identification_helper: { cpe: "cpe:/o:redhat:rhev_hypervisor:4.4::el8", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-common-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", product: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", product_id: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.0.1763-19.el8_6.2?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-2:8.0.1763-19.el8_6.2.src", product: { name: "vim-2:8.0.1763-19.el8_6.2.src", product_id: "vim-2:8.0.1763-19.el8_6.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.0.1763-19.el8_6.2?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.2.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.2.src", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.2.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.2.src", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1621", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083924", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a heap buffer overflow in the vim_strncpy find_word function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: heap buffer overflow in vim_strncpy", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1621", }, { category: "external", summary: "RHBZ#2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1621", url: "https://www.cve.org/CVERecord?id=CVE-2022-1621", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", }, { category: "external", summary: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", url: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-30T21:04:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5319", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", version: "3.0", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: heap buffer overflow in vim_strncpy", }, { cve: "CVE-2022-1629", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083931", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a buffer over-read in the find_next_quote function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in function find_next_quote", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1629", }, { category: "external", summary: "RHBZ#2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1629", url: "https://www.cve.org/CVERecord?id=CVE-2022-1629", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", }, { category: "external", summary: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-30T21:04:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5319", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in function find_next_quote", }, ], }
rhsa-2022:5319
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: heap buffer overflow (CVE-2022-1621)\n\n* vim: buffer over-read (CVE-2022-1629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5319", url: "https://access.redhat.com/errata/RHSA-2022:5319", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5319.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:07:31+00:00", generator: { date: "2024-11-22T19:07:31+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5319", initial_release_date: "2022-06-30T21:04:06+00:00", revision_history: [ { date: "2022-06-30T21:04:06+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-30T21:04:06+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:07:31+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product: { name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4", product_identification_helper: { cpe: "cpe:/o:redhat:rhev_hypervisor:4.4::el8", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-common-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", product: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", product_id: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.0.1763-19.el8_6.2?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-2:8.0.1763-19.el8_6.2.src", product: { name: "vim-2:8.0.1763-19.el8_6.2.src", product_id: "vim-2:8.0.1763-19.el8_6.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.0.1763-19.el8_6.2?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.2.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.2.src", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.2.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.2.src", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1621", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083924", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a heap buffer overflow in the vim_strncpy find_word function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: heap buffer overflow in vim_strncpy", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1621", }, { category: "external", summary: "RHBZ#2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1621", url: "https://www.cve.org/CVERecord?id=CVE-2022-1621", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", }, { category: "external", summary: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", url: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-30T21:04:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5319", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", version: "3.0", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: heap buffer overflow in vim_strncpy", }, { cve: "CVE-2022-1629", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083931", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a buffer over-read in the find_next_quote function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in function find_next_quote", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1629", }, { category: "external", summary: "RHBZ#2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1629", url: "https://www.cve.org/CVERecord?id=CVE-2022-1629", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", }, { category: "external", summary: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-30T21:04:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5319", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in function find_next_quote", }, ], }
RHSA-2022:5319
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: heap buffer overflow (CVE-2022-1621)\n\n* vim: buffer over-read (CVE-2022-1629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5319", url: "https://access.redhat.com/errata/RHSA-2022:5319", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5319.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:07:31+00:00", generator: { date: "2024-11-22T19:07:31+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5319", initial_release_date: "2022-06-30T21:04:06+00:00", revision_history: [ { date: "2022-06-30T21:04:06+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-30T21:04:06+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:07:31+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product: { name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4", product_identification_helper: { cpe: "cpe:/o:redhat:rhev_hypervisor:4.4::el8", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-common-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", product_id: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.2?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", product: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", product_id: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.0.1763-19.el8_6.2?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-2:8.0.1763-19.el8_6.2.src", product: { name: "vim-2:8.0.1763-19.el8_6.2.src", product_id: "vim-2:8.0.1763-19.el8_6.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.0.1763-19.el8_6.2?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.2.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.2.src", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.2.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.2.src", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1621", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083924", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a heap buffer overflow in the vim_strncpy find_word function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: heap buffer overflow in vim_strncpy", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1621", }, { category: "external", summary: "RHBZ#2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1621", url: "https://www.cve.org/CVERecord?id=CVE-2022-1621", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", }, { category: "external", summary: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", url: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-30T21:04:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5319", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", version: "3.0", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: heap buffer overflow in vim_strncpy", }, { cve: "CVE-2022-1629", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083931", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a buffer over-read in the find_next_quote function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in function find_next_quote", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1629", }, { category: "external", summary: "RHBZ#2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1629", url: "https://www.cve.org/CVERecord?id=CVE-2022-1629", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", }, { category: "external", summary: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-30T21:04:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5319", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.2.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.2.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.2.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.2.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in function find_next_quote", }, ], }
rhsa-2022:5242
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Use of Out-of-range Pointer Offset in vim (CVE-2022-0554)\n\n* vim: Heap-based Buffer Overflow occurs in vim (CVE-2022-0943)\n\n* vim: Out-of-range Pointer Offset (CVE-2022-1420)\n\n* vim: heap buffer overflow (CVE-2022-1621)\n\n* vim: buffer over-read (CVE-2022-1629)\n\n* vim: use after free in utf_ptr2char (CVE-2022-1154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5242", url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2058483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2058483", }, { category: "external", summary: "2064064", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064064", }, { category: "external", summary: "2073013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2073013", }, { category: "external", summary: "2077734", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077734", }, { category: "external", summary: "2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5242.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:07:38+00:00", generator: { date: "2024-11-22T19:07:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5242", initial_release_date: "2022-07-01T00:06:08+00:00", revision_history: [ { date: "2022-07-01T00:06:08+00:00", number: "1", summary: "Initial version", }, { date: "2022-07-01T00:06:08+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:07:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 9)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:9::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-2:8.2.2637-16.el9_0.2.src", product: { name: "vim-2:8.2.2637-16.el9_0.2.src", product_id: "vim-2:8.2.2637-16.el9_0.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.2.2637-16.el9_0.2?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", product: { name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", product_id: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.2.2637-16.el9_0.2?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-common-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.2.src", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.2.src", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0554", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, discovery_date: "2022-02-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2058483", }, ], notes: [ { category: "description", text: "A flaw was found in vim that causes an out-of-range pointer offset vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Use of Out-of-range Pointer Offset in vim", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0554", }, { category: "external", summary: "RHBZ#2058483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2058483", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0554", url: "https://www.cve.org/CVERecord?id=CVE-2022-0554", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0554", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0554", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Use of Out-of-range Pointer Offset in vim", }, { cve: "CVE-2022-0943", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, discovery_date: "2022-03-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064064", }, ], notes: [ { category: "description", text: "A heap buffer overflow flaw was found in vim's suggest_try_change() function of the spellsuggest.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a heap-overflow and causing an application to crash, which leads to a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based Buffer Overflow occurs in vim", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux - 6, 7, 8 are not affected, because vulnerable code is not present in binary RPMs of Vim shipped with RHEL.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is not affected, Hence, RHEV is also not affected.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0943", }, { category: "external", summary: "RHBZ#2064064", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064064", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0943", url: "https://www.cve.org/CVERecord?id=CVE-2022-0943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based Buffer Overflow occurs in vim", }, { cve: "CVE-2022-1154", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2022-04-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2073013", }, ], notes: [ { category: "description", text: "A heap use-after-free vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because vim is using a buffer line after it has been freed in the old regexp engine. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.", title: "Vulnerability description", }, { category: "summary", text: "vim: use after free in utf_ptr2char", title: "Vulnerability summary", }, { category: "other", text: "All versions of Vim shipped with Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is affected, Hence, RHEV is also affected.\n\nRed Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nSince Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1154", }, { category: "external", summary: "RHBZ#2073013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2073013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1154", url: "https://www.cve.org/CVERecord?id=CVE-2022-1154", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1154", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1154", }, ], release_date: "2022-04-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "vim: use after free in utf_ptr2char", }, { cve: "CVE-2022-1420", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-04-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2077734", }, ], notes: [ { category: "description", text: "A vulnerability was found in Vim. The issue occurs when using a number in a string for the lambda name, triggering an out-of-range pointer offset vulnerability. This flaw allows an attacker to trick a user into opening a crafted script containing an argument as a number and then using it as a string pointer to access any memory location, causing an application to crash and possibly access some memory.", title: "Vulnerability description", }, { category: "summary", text: "vim: Out-of-range Pointer Offset", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "RHBZ#2077734", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077734", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1420", url: "https://www.cve.org/CVERecord?id=CVE-2022-1420", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1420", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1420", }, ], release_date: "2022-04-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Out-of-range Pointer Offset", }, { cve: "CVE-2022-1621", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083924", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a heap buffer overflow in the vim_strncpy find_word function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: heap buffer overflow in vim_strncpy", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1621", }, { category: "external", summary: "RHBZ#2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1621", url: "https://www.cve.org/CVERecord?id=CVE-2022-1621", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", }, { category: "external", summary: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", url: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", version: "3.0", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: heap buffer overflow in vim_strncpy", }, { cve: "CVE-2022-1629", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083931", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a buffer over-read in the find_next_quote function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in function find_next_quote", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1629", }, { category: "external", summary: "RHBZ#2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1629", url: "https://www.cve.org/CVERecord?id=CVE-2022-1629", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", }, { category: "external", summary: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in function find_next_quote", }, ], }
RHSA-2022:5242
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Use of Out-of-range Pointer Offset in vim (CVE-2022-0554)\n\n* vim: Heap-based Buffer Overflow occurs in vim (CVE-2022-0943)\n\n* vim: Out-of-range Pointer Offset (CVE-2022-1420)\n\n* vim: heap buffer overflow (CVE-2022-1621)\n\n* vim: buffer over-read (CVE-2022-1629)\n\n* vim: use after free in utf_ptr2char (CVE-2022-1154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5242", url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2058483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2058483", }, { category: "external", summary: "2064064", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064064", }, { category: "external", summary: "2073013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2073013", }, { category: "external", summary: "2077734", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077734", }, { category: "external", summary: "2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5242.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:07:38+00:00", generator: { date: "2024-11-22T19:07:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5242", initial_release_date: "2022-07-01T00:06:08+00:00", revision_history: [ { date: "2022-07-01T00:06:08+00:00", number: "1", summary: "Initial version", }, { date: "2022-07-01T00:06:08+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:07:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 9)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:9::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-2:8.2.2637-16.el9_0.2.src", product: { name: "vim-2:8.2.2637-16.el9_0.2.src", product_id: "vim-2:8.2.2637-16.el9_0.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.2.2637-16.el9_0.2?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", product: { name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", product_id: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.2.2637-16.el9_0.2?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-common-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.2.src", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.2.src", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0554", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, discovery_date: "2022-02-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2058483", }, ], notes: [ { category: "description", text: "A flaw was found in vim that causes an out-of-range pointer offset vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Use of Out-of-range Pointer Offset in vim", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0554", }, { category: "external", summary: "RHBZ#2058483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2058483", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0554", url: "https://www.cve.org/CVERecord?id=CVE-2022-0554", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0554", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0554", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Use of Out-of-range Pointer Offset in vim", }, { cve: "CVE-2022-0943", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, discovery_date: "2022-03-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064064", }, ], notes: [ { category: "description", text: "A heap buffer overflow flaw was found in vim's suggest_try_change() function of the spellsuggest.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a heap-overflow and causing an application to crash, which leads to a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based Buffer Overflow occurs in vim", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux - 6, 7, 8 are not affected, because vulnerable code is not present in binary RPMs of Vim shipped with RHEL.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is not affected, Hence, RHEV is also not affected.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0943", }, { category: "external", summary: "RHBZ#2064064", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064064", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0943", url: "https://www.cve.org/CVERecord?id=CVE-2022-0943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based Buffer Overflow occurs in vim", }, { cve: "CVE-2022-1154", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2022-04-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2073013", }, ], notes: [ { category: "description", text: "A heap use-after-free vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because vim is using a buffer line after it has been freed in the old regexp engine. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.", title: "Vulnerability description", }, { category: "summary", text: "vim: use after free in utf_ptr2char", title: "Vulnerability summary", }, { category: "other", text: "All versions of Vim shipped with Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is affected, Hence, RHEV is also affected.\n\nRed Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nSince Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1154", }, { category: "external", summary: "RHBZ#2073013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2073013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1154", url: "https://www.cve.org/CVERecord?id=CVE-2022-1154", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1154", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1154", }, ], release_date: "2022-04-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "vim: use after free in utf_ptr2char", }, { cve: "CVE-2022-1420", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-04-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2077734", }, ], notes: [ { category: "description", text: "A vulnerability was found in Vim. The issue occurs when using a number in a string for the lambda name, triggering an out-of-range pointer offset vulnerability. This flaw allows an attacker to trick a user into opening a crafted script containing an argument as a number and then using it as a string pointer to access any memory location, causing an application to crash and possibly access some memory.", title: "Vulnerability description", }, { category: "summary", text: "vim: Out-of-range Pointer Offset", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "RHBZ#2077734", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077734", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1420", url: "https://www.cve.org/CVERecord?id=CVE-2022-1420", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1420", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1420", }, ], release_date: "2022-04-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Out-of-range Pointer Offset", }, { cve: "CVE-2022-1621", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083924", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a heap buffer overflow in the vim_strncpy find_word function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: heap buffer overflow in vim_strncpy", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1621", }, { category: "external", summary: "RHBZ#2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1621", url: "https://www.cve.org/CVERecord?id=CVE-2022-1621", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", }, { category: "external", summary: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", url: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", version: "3.0", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: heap buffer overflow in vim_strncpy", }, { cve: "CVE-2022-1629", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083931", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a buffer over-read in the find_next_quote function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in function find_next_quote", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1629", }, { category: "external", summary: "RHBZ#2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1629", url: "https://www.cve.org/CVERecord?id=CVE-2022-1629", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", }, { category: "external", summary: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in function find_next_quote", }, ], }
rhsa-2022_5242
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Use of Out-of-range Pointer Offset in vim (CVE-2022-0554)\n\n* vim: Heap-based Buffer Overflow occurs in vim (CVE-2022-0943)\n\n* vim: Out-of-range Pointer Offset (CVE-2022-1420)\n\n* vim: heap buffer overflow (CVE-2022-1621)\n\n* vim: buffer over-read (CVE-2022-1629)\n\n* vim: use after free in utf_ptr2char (CVE-2022-1154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5242", url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2058483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2058483", }, { category: "external", summary: "2064064", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064064", }, { category: "external", summary: "2073013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2073013", }, { category: "external", summary: "2077734", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077734", }, { category: "external", summary: "2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5242.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:07:38+00:00", generator: { date: "2024-11-22T19:07:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5242", initial_release_date: "2022-07-01T00:06:08+00:00", revision_history: [ { date: "2022-07-01T00:06:08+00:00", number: "1", summary: "Initial version", }, { date: "2022-07-01T00:06:08+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:07:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 9)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:9::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-2:8.2.2637-16.el9_0.2.src", product: { name: "vim-2:8.2.2637-16.el9_0.2.src", product_id: "vim-2:8.2.2637-16.el9_0.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.2.2637-16.el9_0.2?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", product: { name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", product_id: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.2.2637-16.el9_0.2?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-common-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-common-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.2.src", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.2.src", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0554", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, discovery_date: "2022-02-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2058483", }, ], notes: [ { category: "description", text: "A flaw was found in vim that causes an out-of-range pointer offset vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Use of Out-of-range Pointer Offset in vim", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0554", }, { category: "external", summary: "RHBZ#2058483", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2058483", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0554", url: "https://www.cve.org/CVERecord?id=CVE-2022-0554", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0554", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0554", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Use of Out-of-range Pointer Offset in vim", }, { cve: "CVE-2022-0943", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, discovery_date: "2022-03-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064064", }, ], notes: [ { category: "description", text: "A heap buffer overflow flaw was found in vim's suggest_try_change() function of the spellsuggest.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a heap-overflow and causing an application to crash, which leads to a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based Buffer Overflow occurs in vim", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux - 6, 7, 8 are not affected, because vulnerable code is not present in binary RPMs of Vim shipped with RHEL.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is not affected, Hence, RHEV is also not affected.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0943", }, { category: "external", summary: "RHBZ#2064064", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064064", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0943", url: "https://www.cve.org/CVERecord?id=CVE-2022-0943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based Buffer Overflow occurs in vim", }, { cve: "CVE-2022-1154", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2022-04-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2073013", }, ], notes: [ { category: "description", text: "A heap use-after-free vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because vim is using a buffer line after it has been freed in the old regexp engine. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.", title: "Vulnerability description", }, { category: "summary", text: "vim: use after free in utf_ptr2char", title: "Vulnerability summary", }, { category: "other", text: "All versions of Vim shipped with Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is affected, Hence, RHEV is also affected.\n\nRed Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nSince Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1154", }, { category: "external", summary: "RHBZ#2073013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2073013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1154", url: "https://www.cve.org/CVERecord?id=CVE-2022-1154", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1154", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1154", }, ], release_date: "2022-04-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "vim: use after free in utf_ptr2char", }, { cve: "CVE-2022-1420", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-04-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2077734", }, ], notes: [ { category: "description", text: "A vulnerability was found in Vim. The issue occurs when using a number in a string for the lambda name, triggering an out-of-range pointer offset vulnerability. This flaw allows an attacker to trick a user into opening a crafted script containing an argument as a number and then using it as a string pointer to access any memory location, causing an application to crash and possibly access some memory.", title: "Vulnerability description", }, { category: "summary", text: "vim: Out-of-range Pointer Offset", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "RHBZ#2077734", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2077734", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1420", url: "https://www.cve.org/CVERecord?id=CVE-2022-1420", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1420", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1420", }, ], release_date: "2022-04-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Out-of-range Pointer Offset", }, { cve: "CVE-2022-1621", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083924", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a heap buffer overflow in the vim_strncpy find_word function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: heap buffer overflow in vim_strncpy", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1621", }, { category: "external", summary: "RHBZ#2083924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083924", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1621", url: "https://www.cve.org/CVERecord?id=CVE-2022-1621", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1621", }, { category: "external", summary: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", url: "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", version: "3.0", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: heap buffer overflow in vim_strncpy", }, { cve: "CVE-2022-1629", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2083931", }, ], notes: [ { category: "description", text: "A flaw was found in vim, where it is vulnerable to a buffer over-read in the find_next_quote function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in function find_next_quote", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1629", }, { category: "external", summary: "RHBZ#2083931", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2083931", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1629", url: "https://www.cve.org/CVERecord?id=CVE-2022-1629", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", }, { category: "external", summary: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, ], release_date: "2022-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-01T00:06:08+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5242", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in function find_next_quote", }, ], }
opensuse-su-2024:12337-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "gvim-9.0.0453-2.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the gvim-9.0.0453-2.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12337", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12337-1.json", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0213 page", url: "https://www.suse.com/security/cve/CVE-2022-0213/", }, { category: "self", summary: "SUSE CVE CVE-2022-0261 page", url: "https://www.suse.com/security/cve/CVE-2022-0261/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0359 page", url: "https://www.suse.com/security/cve/CVE-2022-0359/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0368 page", url: "https://www.suse.com/security/cve/CVE-2022-0368/", }, { category: "self", summary: "SUSE CVE CVE-2022-0392 page", url: "https://www.suse.com/security/cve/CVE-2022-0392/", }, { category: "self", summary: "SUSE CVE CVE-2022-0407 page", url: "https://www.suse.com/security/cve/CVE-2022-0407/", }, { category: "self", summary: "SUSE CVE CVE-2022-0408 page", url: "https://www.suse.com/security/cve/CVE-2022-0408/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, { category: "self", summary: "SUSE CVE CVE-2022-0554 page", url: "https://www.suse.com/security/cve/CVE-2022-0554/", }, { category: "self", summary: "SUSE CVE CVE-2022-0572 page", url: "https://www.suse.com/security/cve/CVE-2022-0572/", }, { category: "self", summary: "SUSE CVE CVE-2022-0629 page", url: "https://www.suse.com/security/cve/CVE-2022-0629/", }, { category: "self", summary: "SUSE CVE CVE-2022-0685 page", url: "https://www.suse.com/security/cve/CVE-2022-0685/", }, { category: "self", summary: "SUSE CVE CVE-2022-0729 page", url: "https://www.suse.com/security/cve/CVE-2022-0729/", }, { category: "self", summary: "SUSE CVE CVE-2022-0943 page", url: "https://www.suse.com/security/cve/CVE-2022-0943/", }, { category: "self", summary: "SUSE CVE CVE-2022-1154 page", url: "https://www.suse.com/security/cve/CVE-2022-1154/", }, { category: "self", summary: "SUSE CVE CVE-2022-1160 page", url: "https://www.suse.com/security/cve/CVE-2022-1160/", }, { category: "self", summary: "SUSE CVE CVE-2022-1420 page", url: "https://www.suse.com/security/cve/CVE-2022-1420/", }, { category: "self", summary: "SUSE CVE CVE-2022-1616 page", url: "https://www.suse.com/security/cve/CVE-2022-1616/", }, { category: "self", summary: "SUSE CVE CVE-2022-1619 page", url: "https://www.suse.com/security/cve/CVE-2022-1619/", }, { category: "self", summary: "SUSE CVE CVE-2022-1620 page", url: "https://www.suse.com/security/cve/CVE-2022-1620/", }, { category: "self", summary: "SUSE CVE CVE-2022-1621 page", url: "https://www.suse.com/security/cve/CVE-2022-1621/", }, { category: "self", summary: "SUSE CVE CVE-2022-1629 page", url: "https://www.suse.com/security/cve/CVE-2022-1629/", }, { category: "self", summary: "SUSE CVE CVE-2022-1674 page", url: "https://www.suse.com/security/cve/CVE-2022-1674/", }, { category: "self", summary: "SUSE CVE CVE-2022-1720 page", url: "https://www.suse.com/security/cve/CVE-2022-1720/", }, { category: "self", summary: "SUSE CVE CVE-2022-1733 page", url: "https://www.suse.com/security/cve/CVE-2022-1733/", }, { category: "self", summary: "SUSE CVE CVE-2022-1735 page", url: "https://www.suse.com/security/cve/CVE-2022-1735/", }, { category: "self", summary: "SUSE CVE CVE-2022-1769 page", url: "https://www.suse.com/security/cve/CVE-2022-1769/", }, { category: "self", summary: "SUSE CVE CVE-2022-1771 page", url: "https://www.suse.com/security/cve/CVE-2022-1771/", }, { category: "self", summary: "SUSE CVE CVE-2022-1785 page", url: "https://www.suse.com/security/cve/CVE-2022-1785/", }, { category: "self", summary: "SUSE CVE CVE-2022-1796 page", url: "https://www.suse.com/security/cve/CVE-2022-1796/", }, { category: "self", summary: "SUSE CVE CVE-2022-1851 page", url: "https://www.suse.com/security/cve/CVE-2022-1851/", }, { category: "self", summary: "SUSE CVE CVE-2022-1886 page", url: "https://www.suse.com/security/cve/CVE-2022-1886/", }, { category: "self", summary: "SUSE CVE CVE-2022-1897 page", url: "https://www.suse.com/security/cve/CVE-2022-1897/", }, { category: "self", summary: "SUSE CVE CVE-2022-1898 page", url: "https://www.suse.com/security/cve/CVE-2022-1898/", }, { category: "self", summary: "SUSE CVE CVE-2022-1927 page", url: "https://www.suse.com/security/cve/CVE-2022-1927/", }, { category: "self", summary: "SUSE CVE CVE-2022-1942 page", url: "https://www.suse.com/security/cve/CVE-2022-1942/", }, { category: "self", summary: "SUSE CVE CVE-2022-1968 page", url: "https://www.suse.com/security/cve/CVE-2022-1968/", }, { category: "self", summary: "SUSE CVE CVE-2022-2000 page", url: "https://www.suse.com/security/cve/CVE-2022-2000/", }, { category: "self", summary: "SUSE CVE CVE-2022-2042 page", url: "https://www.suse.com/security/cve/CVE-2022-2042/", }, { category: "self", summary: "SUSE CVE CVE-2022-2124 page", url: "https://www.suse.com/security/cve/CVE-2022-2124/", }, { category: "self", summary: "SUSE CVE CVE-2022-2125 page", url: "https://www.suse.com/security/cve/CVE-2022-2125/", }, { category: "self", summary: "SUSE CVE CVE-2022-2126 page", url: "https://www.suse.com/security/cve/CVE-2022-2126/", }, { category: "self", summary: "SUSE CVE CVE-2022-2129 page", url: "https://www.suse.com/security/cve/CVE-2022-2129/", }, { category: "self", summary: "SUSE CVE CVE-2022-2175 page", url: "https://www.suse.com/security/cve/CVE-2022-2175/", }, { category: "self", summary: "SUSE CVE CVE-2022-2182 page", url: "https://www.suse.com/security/cve/CVE-2022-2182/", }, { category: "self", summary: "SUSE CVE CVE-2022-2183 page", url: "https://www.suse.com/security/cve/CVE-2022-2183/", }, { category: "self", summary: "SUSE CVE CVE-2022-2206 page", url: "https://www.suse.com/security/cve/CVE-2022-2206/", }, { category: "self", summary: "SUSE CVE CVE-2022-2207 page", url: "https://www.suse.com/security/cve/CVE-2022-2207/", }, { category: "self", summary: "SUSE CVE CVE-2022-2208 page", url: "https://www.suse.com/security/cve/CVE-2022-2208/", }, { category: "self", summary: "SUSE CVE CVE-2022-2210 page", url: "https://www.suse.com/security/cve/CVE-2022-2210/", }, { category: "self", summary: "SUSE CVE CVE-2022-2231 page", url: "https://www.suse.com/security/cve/CVE-2022-2231/", }, { category: "self", summary: "SUSE CVE CVE-2022-2264 page", url: "https://www.suse.com/security/cve/CVE-2022-2264/", }, { category: "self", summary: "SUSE CVE CVE-2022-2284 page", url: "https://www.suse.com/security/cve/CVE-2022-2284/", }, { category: "self", summary: "SUSE CVE CVE-2022-2286 page", url: "https://www.suse.com/security/cve/CVE-2022-2286/", }, { category: "self", summary: "SUSE CVE CVE-2022-2287 page", url: "https://www.suse.com/security/cve/CVE-2022-2287/", }, { category: "self", summary: "SUSE CVE CVE-2022-2288 page", url: "https://www.suse.com/security/cve/CVE-2022-2288/", }, { category: "self", summary: "SUSE CVE CVE-2022-2289 page", url: "https://www.suse.com/security/cve/CVE-2022-2289/", }, { category: "self", summary: "SUSE CVE CVE-2022-2304 page", url: "https://www.suse.com/security/cve/CVE-2022-2304/", }, { category: "self", summary: "SUSE CVE CVE-2022-2343 page", url: "https://www.suse.com/security/cve/CVE-2022-2343/", }, { category: "self", summary: "SUSE CVE CVE-2022-2344 page", url: "https://www.suse.com/security/cve/CVE-2022-2344/", }, { category: "self", summary: "SUSE CVE CVE-2022-2345 page", url: "https://www.suse.com/security/cve/CVE-2022-2345/", }, { category: "self", summary: "SUSE CVE CVE-2022-2571 page", url: "https://www.suse.com/security/cve/CVE-2022-2571/", }, { category: "self", summary: "SUSE CVE CVE-2022-2580 page", url: "https://www.suse.com/security/cve/CVE-2022-2580/", }, { category: "self", summary: "SUSE CVE CVE-2022-2581 page", url: "https://www.suse.com/security/cve/CVE-2022-2581/", }, { category: "self", summary: "SUSE CVE CVE-2022-2598 page", url: "https://www.suse.com/security/cve/CVE-2022-2598/", }, { category: "self", summary: "SUSE CVE CVE-2022-2816 page", url: "https://www.suse.com/security/cve/CVE-2022-2816/", }, { category: "self", summary: "SUSE CVE CVE-2022-2817 page", url: "https://www.suse.com/security/cve/CVE-2022-2817/", }, { category: "self", summary: "SUSE CVE CVE-2022-2819 page", url: "https://www.suse.com/security/cve/CVE-2022-2819/", }, { category: "self", summary: "SUSE CVE CVE-2022-2849 page", url: "https://www.suse.com/security/cve/CVE-2022-2849/", }, { category: "self", summary: "SUSE CVE CVE-2022-2862 page", url: "https://www.suse.com/security/cve/CVE-2022-2862/", }, { category: "self", summary: "SUSE CVE CVE-2022-2874 page", url: "https://www.suse.com/security/cve/CVE-2022-2874/", }, { category: "self", summary: "SUSE CVE CVE-2022-2889 page", url: "https://www.suse.com/security/cve/CVE-2022-2889/", }, { category: "self", summary: "SUSE CVE CVE-2022-2923 page", url: "https://www.suse.com/security/cve/CVE-2022-2923/", }, { category: "self", summary: "SUSE CVE CVE-2022-2946 page", url: "https://www.suse.com/security/cve/CVE-2022-2946/", }, { category: "self", summary: "SUSE CVE CVE-2022-2980 page", url: "https://www.suse.com/security/cve/CVE-2022-2980/", }, { category: "self", summary: "SUSE CVE CVE-2022-2982 page", url: "https://www.suse.com/security/cve/CVE-2022-2982/", }, { category: "self", summary: "SUSE CVE CVE-2022-3016 page", url: "https://www.suse.com/security/cve/CVE-2022-3016/", }, { category: "self", summary: "SUSE CVE CVE-2022-3037 page", url: "https://www.suse.com/security/cve/CVE-2022-3037/", }, { category: "self", summary: "SUSE CVE CVE-2022-3153 page", url: "https://www.suse.com/security/cve/CVE-2022-3153/", }, ], title: "gvim-9.0.0453-2.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12337-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.aarch64", product: { name: "gvim-9.0.0453-2.1.aarch64", product_id: "gvim-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.aarch64", product: { name: "vim-9.0.0453-2.1.aarch64", product_id: "vim-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.aarch64", product: { name: "vim-data-9.0.0453-2.1.aarch64", product_id: "vim-data-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.aarch64", product: { name: "vim-data-common-9.0.0453-2.1.aarch64", product_id: "vim-data-common-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.aarch64", product: { name: "vim-small-9.0.0453-2.1.aarch64", product_id: "vim-small-9.0.0453-2.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.ppc64le", product: { name: "gvim-9.0.0453-2.1.ppc64le", product_id: "gvim-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.ppc64le", product: { name: "vim-9.0.0453-2.1.ppc64le", product_id: "vim-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.ppc64le", product: { name: "vim-data-9.0.0453-2.1.ppc64le", product_id: "vim-data-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.ppc64le", product: { name: "vim-data-common-9.0.0453-2.1.ppc64le", product_id: "vim-data-common-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.ppc64le", product: { name: "vim-small-9.0.0453-2.1.ppc64le", product_id: "vim-small-9.0.0453-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.s390x", product: { name: "gvim-9.0.0453-2.1.s390x", product_id: "gvim-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.s390x", product: { name: "vim-9.0.0453-2.1.s390x", product_id: "vim-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.s390x", product: { name: "vim-data-9.0.0453-2.1.s390x", product_id: "vim-data-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.s390x", product: { name: "vim-data-common-9.0.0453-2.1.s390x", product_id: "vim-data-common-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.s390x", product: { name: "vim-small-9.0.0453-2.1.s390x", product_id: "vim-small-9.0.0453-2.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.x86_64", product: { name: "gvim-9.0.0453-2.1.x86_64", product_id: "gvim-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.x86_64", product: { name: "vim-9.0.0453-2.1.x86_64", product_id: "vim-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.x86_64", product: { name: "vim-data-9.0.0453-2.1.x86_64", product_id: "vim-data-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.x86_64", product: { name: "vim-data-common-9.0.0453-2.1.x86_64", product_id: "vim-data-common-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.x86_64", product: { name: "vim-small-9.0.0453-2.1.x86_64", product_id: "vim-small-9.0.0453-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", }, product_reference: "gvim-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", }, product_reference: "gvim-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", }, product_reference: "gvim-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", }, product_reference: "gvim-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", }, product_reference: "vim-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", }, product_reference: "vim-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", }, product_reference: "vim-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", }, product_reference: "vim-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", }, product_reference: "vim-data-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", }, product_reference: "vim-data-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", }, product_reference: "vim-data-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", }, product_reference: "vim-data-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", }, product_reference: "vim-data-common-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", }, product_reference: "vim-data-common-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", }, product_reference: "vim-data-common-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", }, product_reference: "vim-data-common-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", }, product_reference: "vim-small-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", }, product_reference: "vim-small-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", }, product_reference: "vim-small-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", }, product_reference: "vim-small-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0213", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0213", url: "https://www.suse.com/security/cve/CVE-2022-0213", }, { category: "external", summary: "SUSE Bug 1194885 for CVE-2022-0213", url: "https://bugzilla.suse.com/1194885", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0213", }, { cve: "CVE-2022-0261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0261", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0261", url: "https://www.suse.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "SUSE Bug 1194872 for CVE-2022-0261", url: "https://bugzilla.suse.com/1194872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0359", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0359", url: "https://www.suse.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "SUSE Bug 1195203 for CVE-2022-0359", url: "https://bugzilla.suse.com/1195203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0368", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0368", url: "https://www.suse.com/security/cve/CVE-2022-0368", }, { category: "external", summary: "SUSE Bug 1195205 for CVE-2022-0368", url: "https://bugzilla.suse.com/1195205", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0368", }, { cve: "CVE-2022-0392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0392", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0392", url: "https://www.suse.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "SUSE Bug 1195332 for CVE-2022-0392", url: "https://bugzilla.suse.com/1195332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0407", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0407", url: "https://www.suse.com/security/cve/CVE-2022-0407", }, { category: "external", summary: "SUSE Bug 1195354 for CVE-2022-0407", url: "https://bugzilla.suse.com/1195354", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0407", }, { cve: "CVE-2022-0408", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0408", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0408", url: "https://www.suse.com/security/cve/CVE-2022-0408", }, { category: "external", summary: "SUSE Bug 1195459 for CVE-2022-0408", url: "https://bugzilla.suse.com/1195459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0408", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0413", }, { cve: "CVE-2022-0554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0554", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0554", url: "https://www.suse.com/security/cve/CVE-2022-0554", }, { category: "external", summary: "SUSE Bug 1195846 for CVE-2022-0554", url: "https://bugzilla.suse.com/1195846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0554", }, { cve: "CVE-2022-0572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0572", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0572", url: "https://www.suse.com/security/cve/CVE-2022-0572", }, { category: "external", summary: "SUSE Bug 1196023 for CVE-2022-0572", url: "https://bugzilla.suse.com/1196023", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0629", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0629", url: "https://www.suse.com/security/cve/CVE-2022-0629", }, { category: "external", summary: "SUSE Bug 1196226 for CVE-2022-0629", url: "https://bugzilla.suse.com/1196226", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0685", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0685", url: "https://www.suse.com/security/cve/CVE-2022-0685", }, { category: "external", summary: "SUSE Bug 1196227 for CVE-2022-0685", url: "https://bugzilla.suse.com/1196227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0685", }, { cve: "CVE-2022-0729", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0729", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0729", url: "https://www.suse.com/security/cve/CVE-2022-0729", }, { category: "external", summary: "SUSE Bug 1196437 for CVE-2022-0729", url: "https://bugzilla.suse.com/1196437", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-0729", }, { cve: "CVE-2022-0943", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0943", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0943", url: "https://www.suse.com/security/cve/CVE-2022-0943", }, { category: "external", summary: "SUSE Bug 1197225 for CVE-2022-0943", url: "https://bugzilla.suse.com/1197225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0943", }, { cve: "CVE-2022-1154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1154", }, ], notes: [ { category: "general", text: "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1154", url: "https://www.suse.com/security/cve/CVE-2022-1154", }, { category: "external", summary: "SUSE Bug 1197813 for CVE-2022-1154", url: "https://bugzilla.suse.com/1197813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1154", }, { cve: "CVE-2022-1160", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1160", }, ], notes: [ { category: "general", text: "heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1160", url: "https://www.suse.com/security/cve/CVE-2022-1160", }, { category: "external", summary: "SUSE Bug 1197814 for CVE-2022-1160", url: "https://bugzilla.suse.com/1197814", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1160", }, { cve: "CVE-2022-1420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1420", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1420", url: "https://www.suse.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "SUSE Bug 1198748 for CVE-2022-1420", url: "https://bugzilla.suse.com/1198748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1616", }, ], notes: [ { category: "general", text: "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1616", url: "https://www.suse.com/security/cve/CVE-2022-1616", }, { category: "external", summary: "SUSE Bug 1199331 for CVE-2022-1616", url: "https://bugzilla.suse.com/1199331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1619", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1619", url: "https://www.suse.com/security/cve/CVE-2022-1619", }, { category: "external", summary: "SUSE Bug 1199333 for CVE-2022-1619", url: "https://bugzilla.suse.com/1199333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1620", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1620", url: "https://www.suse.com/security/cve/CVE-2022-1620", }, { category: "external", summary: "SUSE Bug 1199334 for CVE-2022-1620", url: "https://bugzilla.suse.com/1199334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1620", }, { cve: "CVE-2022-1621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1621", }, ], notes: [ { category: "general", text: "Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1621", url: "https://www.suse.com/security/cve/CVE-2022-1621", }, { category: "external", summary: "SUSE Bug 1199435 for CVE-2022-1621", url: "https://bugzilla.suse.com/1199435", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1621", }, { cve: "CVE-2022-1629", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1629", }, ], notes: [ { category: "general", text: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1629", url: "https://www.suse.com/security/cve/CVE-2022-1629", }, { category: "external", summary: "SUSE Bug 1199436 for CVE-2022-1629", url: "https://bugzilla.suse.com/1199436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1629", }, { cve: "CVE-2022-1674", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1674", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1674", url: "https://www.suse.com/security/cve/CVE-2022-1674", }, { category: "external", summary: "SUSE Bug 1199502 for CVE-2022-1674", url: "https://bugzilla.suse.com/1199502", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1674", }, { cve: "CVE-2022-1720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1720", }, ], notes: [ { category: "general", text: "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1720", url: "https://www.suse.com/security/cve/CVE-2022-1720", }, { category: "external", summary: "SUSE Bug 1200732 for CVE-2022-1720", url: "https://bugzilla.suse.com/1200732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1720", }, { cve: "CVE-2022-1733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1733", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1733", url: "https://www.suse.com/security/cve/CVE-2022-1733", }, { category: "external", summary: "SUSE Bug 1199655 for CVE-2022-1733", url: "https://bugzilla.suse.com/1199655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1735", }, ], notes: [ { category: "general", text: "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1735", url: "https://www.suse.com/security/cve/CVE-2022-1735", }, { category: "external", summary: "SUSE Bug 1199651 for CVE-2022-1735", url: "https://bugzilla.suse.com/1199651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1735", }, { cve: "CVE-2022-1769", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1769", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1769", url: "https://www.suse.com/security/cve/CVE-2022-1769", }, { category: "external", summary: "SUSE Bug 1199658 for CVE-2022-1769", url: "https://bugzilla.suse.com/1199658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1769", }, { cve: "CVE-2022-1771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1771", }, ], notes: [ { category: "general", text: "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1771", url: "https://www.suse.com/security/cve/CVE-2022-1771", }, { category: "external", summary: "SUSE Bug 1199693 for CVE-2022-1771", url: "https://bugzilla.suse.com/1199693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1785", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1785", url: "https://www.suse.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "SUSE Bug 1199745 for CVE-2022-1785", url: "https://bugzilla.suse.com/1199745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1796", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.4979.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1796", url: "https://www.suse.com/security/cve/CVE-2022-1796", }, { category: "external", summary: "SUSE Bug 1199747 for CVE-2022-1796", url: "https://bugzilla.suse.com/1199747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1851", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1851", url: "https://www.suse.com/security/cve/CVE-2022-1851", }, { category: "external", summary: "SUSE Bug 1199936 for CVE-2022-1851", url: "https://bugzilla.suse.com/1199936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1851", }, { cve: "CVE-2022-1886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1886", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1886", url: "https://www.suse.com/security/cve/CVE-2022-1886", }, { category: "external", summary: "SUSE Bug 1199969 for CVE-2022-1886", url: "https://bugzilla.suse.com/1199969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1886", }, { cve: "CVE-2022-1897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1897", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1897", url: "https://www.suse.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "SUSE Bug 1200010 for CVE-2022-1897", url: "https://bugzilla.suse.com/1200010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1898", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1898", url: "https://www.suse.com/security/cve/CVE-2022-1898", }, { category: "external", summary: "SUSE Bug 1200011 for CVE-2022-1898", url: "https://bugzilla.suse.com/1200011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1927", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1927", url: "https://www.suse.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "SUSE Bug 1200012 for CVE-2022-1927", url: "https://bugzilla.suse.com/1200012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1927", }, { cve: "CVE-2022-1942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1942", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1942", url: "https://www.suse.com/security/cve/CVE-2022-1942", }, { category: "external", summary: "SUSE Bug 1200125 for CVE-2022-1942", url: "https://bugzilla.suse.com/1200125", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1942", }, { cve: "CVE-2022-1968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1968", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1968", url: "https://www.suse.com/security/cve/CVE-2022-1968", }, { category: "external", summary: "SUSE Bug 1200270 for CVE-2022-1968", url: "https://bugzilla.suse.com/1200270", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1968", }, { cve: "CVE-2022-2000", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2000", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2000", url: "https://www.suse.com/security/cve/CVE-2022-2000", }, { category: "external", summary: "SUSE Bug 1200405 for CVE-2022-2000", url: "https://bugzilla.suse.com/1200405", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2000", }, { cve: "CVE-2022-2042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2042", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2042", url: "https://www.suse.com/security/cve/CVE-2022-2042", }, { category: "external", summary: "SUSE Bug 1200471 for CVE-2022-2042", url: "https://bugzilla.suse.com/1200471", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2042", }, { cve: "CVE-2022-2124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2124", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2124", url: "https://www.suse.com/security/cve/CVE-2022-2124", }, { category: "external", summary: "SUSE Bug 1200697 for CVE-2022-2124", url: "https://bugzilla.suse.com/1200697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2125", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2125", url: "https://www.suse.com/security/cve/CVE-2022-2125", }, { category: "external", summary: "SUSE Bug 1200698 for CVE-2022-2125", url: "https://bugzilla.suse.com/1200698", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-2125", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2126", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2126", url: "https://www.suse.com/security/cve/CVE-2022-2126", }, { category: "external", summary: "SUSE Bug 1200700 for CVE-2022-2126", url: "https://bugzilla.suse.com/1200700", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2129", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2129", url: "https://www.suse.com/security/cve/CVE-2022-2129", }, { category: "external", summary: "SUSE Bug 1200701 for CVE-2022-2129", url: "https://bugzilla.suse.com/1200701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2129", }, { cve: "CVE-2022-2175", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2175", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2175", url: "https://www.suse.com/security/cve/CVE-2022-2175", }, { category: "external", summary: "SUSE Bug 1200904 for CVE-2022-2175", url: "https://bugzilla.suse.com/1200904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2182", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2182", url: "https://www.suse.com/security/cve/CVE-2022-2182", }, { category: "external", summary: "SUSE Bug 1200903 for CVE-2022-2182", url: "https://bugzilla.suse.com/1200903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2183", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2183", url: "https://www.suse.com/security/cve/CVE-2022-2183", }, { category: "external", summary: "SUSE Bug 1200902 for CVE-2022-2183", url: "https://bugzilla.suse.com/1200902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2206", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2206", url: "https://www.suse.com/security/cve/CVE-2022-2206", }, { category: "external", summary: "SUSE Bug 1201155 for CVE-2022-2206", url: "https://bugzilla.suse.com/1201155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2207", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2207", url: "https://www.suse.com/security/cve/CVE-2022-2207", }, { category: "external", summary: "SUSE Bug 1201153 for CVE-2022-2207", url: "https://bugzilla.suse.com/1201153", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2208", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2208", url: "https://www.suse.com/security/cve/CVE-2022-2208", }, { category: "external", summary: "SUSE Bug 1201152 for CVE-2022-2208", url: "https://bugzilla.suse.com/1201152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2210", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2210", url: "https://www.suse.com/security/cve/CVE-2022-2210", }, { category: "external", summary: "SUSE Bug 1201151 for CVE-2022-2210", url: "https://bugzilla.suse.com/1201151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2231", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2231", url: "https://www.suse.com/security/cve/CVE-2022-2231", }, { category: "external", summary: "SUSE Bug 1201150 for CVE-2022-2231", url: "https://bugzilla.suse.com/1201150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2231", }, { cve: "CVE-2022-2264", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2264", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2264", url: "https://www.suse.com/security/cve/CVE-2022-2264", }, { category: "external", summary: "SUSE Bug 1201132 for CVE-2022-2264", url: "https://bugzilla.suse.com/1201132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2284", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2284", url: "https://www.suse.com/security/cve/CVE-2022-2284", }, { category: "external", summary: "SUSE Bug 1201133 for CVE-2022-2284", url: "https://bugzilla.suse.com/1201133", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2284", }, { cve: "CVE-2022-2286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2286", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2286", url: "https://www.suse.com/security/cve/CVE-2022-2286", }, { category: "external", summary: "SUSE Bug 1201135 for CVE-2022-2286", url: "https://bugzilla.suse.com/1201135", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2287", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2287", url: "https://www.suse.com/security/cve/CVE-2022-2287", }, { category: "external", summary: "SUSE Bug 1201136 for CVE-2022-2287", url: "https://bugzilla.suse.com/1201136", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2287", }, { cve: "CVE-2022-2288", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2288", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2288", url: "https://www.suse.com/security/cve/CVE-2022-2288", }, { category: "external", summary: "SUSE Bug 1201137 for CVE-2022-2288", url: "https://bugzilla.suse.com/1201137", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2288", }, { cve: "CVE-2022-2289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2289", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2289", url: "https://www.suse.com/security/cve/CVE-2022-2289", }, { category: "external", summary: "SUSE Bug 1201139 for CVE-2022-2289", url: "https://bugzilla.suse.com/1201139", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2289", }, { cve: "CVE-2022-2304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2304", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2304", url: "https://www.suse.com/security/cve/CVE-2022-2304", }, { category: "external", summary: "SUSE Bug 1201249 for CVE-2022-2304", url: "https://bugzilla.suse.com/1201249", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2304", }, { cve: "CVE-2022-2343", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2343", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2343", url: "https://www.suse.com/security/cve/CVE-2022-2343", }, { category: "external", summary: "SUSE Bug 1201356 for CVE-2022-2343", url: "https://bugzilla.suse.com/1201356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2344", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2344", url: "https://www.suse.com/security/cve/CVE-2022-2344", }, { category: "external", summary: "SUSE Bug 1201359 for CVE-2022-2344", url: "https://bugzilla.suse.com/1201359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2345", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0046.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2345", url: "https://www.suse.com/security/cve/CVE-2022-2345", }, { category: "external", summary: "SUSE Bug 1201363 for CVE-2022-2345", url: "https://bugzilla.suse.com/1201363", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2345", }, { cve: "CVE-2022-2571", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2571", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2571", url: "https://www.suse.com/security/cve/CVE-2022-2571", }, { category: "external", summary: "SUSE Bug 1202046 for CVE-2022-2571", url: "https://bugzilla.suse.com/1202046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2580", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2580", url: "https://www.suse.com/security/cve/CVE-2022-2580", }, { category: "external", summary: "SUSE Bug 1202049 for CVE-2022-2580", url: "https://bugzilla.suse.com/1202049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2581", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2581", url: "https://www.suse.com/security/cve/CVE-2022-2581", }, { category: "external", summary: "SUSE Bug 1202050 for CVE-2022-2581", url: "https://bugzilla.suse.com/1202050", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2581", }, { cve: "CVE-2022-2598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2598", }, ], notes: [ { category: "general", text: "Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2598", url: "https://www.suse.com/security/cve/CVE-2022-2598", }, { category: "external", summary: "SUSE Bug 1202051 for CVE-2022-2598", url: "https://bugzilla.suse.com/1202051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2598", }, { cve: "CVE-2022-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2816", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2816", url: "https://www.suse.com/security/cve/CVE-2022-2816", }, { category: "external", summary: "SUSE Bug 1202421 for CVE-2022-2816", url: "https://bugzilla.suse.com/1202421", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2816", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2817", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2817", url: "https://www.suse.com/security/cve/CVE-2022-2817", }, { category: "external", summary: "SUSE Bug 1202420 for CVE-2022-2817", url: "https://bugzilla.suse.com/1202420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2819", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2819", url: "https://www.suse.com/security/cve/CVE-2022-2819", }, { category: "external", summary: "SUSE Bug 1202414 for CVE-2022-2819", url: "https://bugzilla.suse.com/1202414", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2819", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2819", }, { cve: "CVE-2022-2849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2849", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2849", url: "https://www.suse.com/security/cve/CVE-2022-2849", }, { category: "external", summary: "SUSE Bug 1202512 for CVE-2022-2849", url: "https://bugzilla.suse.com/1202512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2862", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0221.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2862", url: "https://www.suse.com/security/cve/CVE-2022-2862", }, { category: "external", summary: "SUSE Bug 1202511 for CVE-2022-2862", url: "https://bugzilla.suse.com/1202511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2862", }, { cve: "CVE-2022-2874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2874", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2874", url: "https://www.suse.com/security/cve/CVE-2022-2874", }, { category: "external", summary: "SUSE Bug 1202552 for CVE-2022-2874", url: "https://bugzilla.suse.com/1202552", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2874", }, { cve: "CVE-2022-2889", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2889", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0225.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2889", url: "https://www.suse.com/security/cve/CVE-2022-2889", }, { category: "external", summary: "SUSE Bug 1202599 for CVE-2022-2889", url: "https://bugzilla.suse.com/1202599", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2889", }, { cve: "CVE-2022-2923", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2923", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2923", url: "https://www.suse.com/security/cve/CVE-2022-2923", }, { category: "external", summary: "SUSE Bug 1202687 for CVE-2022-2923", url: "https://bugzilla.suse.com/1202687", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2946", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0246.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2946", url: "https://www.suse.com/security/cve/CVE-2022-2946", }, { category: "external", summary: "SUSE Bug 1202689 for CVE-2022-2946", url: "https://bugzilla.suse.com/1202689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2946", }, { cve: "CVE-2022-2980", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2980", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2980", url: "https://www.suse.com/security/cve/CVE-2022-2980", }, { category: "external", summary: "SUSE Bug 1203155 for CVE-2022-2980", url: "https://bugzilla.suse.com/1203155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2982", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0260.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2982", url: "https://www.suse.com/security/cve/CVE-2022-2982", }, { category: "external", summary: "SUSE Bug 1203152 for CVE-2022-2982", url: "https://bugzilla.suse.com/1203152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2982", }, { cve: "CVE-2022-3016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3016", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0286.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3016", url: "https://www.suse.com/security/cve/CVE-2022-3016", }, { category: "external", summary: "SUSE Bug 1202862 for CVE-2022-3016", url: "https://bugzilla.suse.com/1202862", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-3016", }, { cve: "CVE-2022-3037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3037", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0322.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3037", url: "https://www.suse.com/security/cve/CVE-2022-3037", }, { category: "external", summary: "SUSE Bug 1202962 for CVE-2022-3037", url: "https://bugzilla.suse.com/1202962", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-3037", }, { cve: "CVE-2022-3153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3153", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3153", url: "https://www.suse.com/security/cve/CVE-2022-3153", }, { category: "external", summary: "SUSE Bug 1203272 for CVE-2022-3153", url: "https://bugzilla.suse.com/1203272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-3153", }, ], }
ghsa-pcg2-vhm9-hhqc
Vulnerability from github
Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
{ affected: [], aliases: [ "CVE-2022-1629", ], database_specific: { cwe_ids: [ "CWE-125", "CWE-126", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-05-10T14:15:00Z", severity: "HIGH", }, details: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", id: "GHSA-pcg2-vhm9-hhqc", modified: "2022-05-17T00:01:25Z", published: "2022-05-11T00:01:38Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1629", }, { type: "WEB", url: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", }, { type: "WEB", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202208-32", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202305-16", }, { type: "WEB", url: "https://support.apple.com/kb/HT213488", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
gsd-2022-1629
Vulnerability from gsd
{ GSD: { alias: "CVE-2022-1629", description: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", id: "GSD-2022-1629", references: [ "https://advisories.mageia.org/CVE-2022-1629.html", "https://www.suse.com/security/cve/CVE-2022-1629.html", "https://access.redhat.com/errata/RHSA-2022:5242", "https://access.redhat.com/errata/RHSA-2022:5319", "https://ubuntu.com/security/CVE-2022-1629", "https://alas.aws.amazon.com/cve/html/CVE-2022-1629.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2022-1629", ], details: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", id: "GSD-2022-1629", modified: "2023-12-13T01:19:28.106133Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1629", STATE: "PUBLIC", TITLE: "Buffer Over-read in function find_next_quote in vim/vim", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "vim/vim", version: { version_data: [ { version_affected: "<", version_value: "8.2.4925", }, ], }, }, ], }, vendor_name: "vim", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-126 Buffer Over-read", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", refsource: "CONFIRM", url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, { name: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", refsource: "MISC", url: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", }, { name: "FEDORA-2022-8df66cdbef", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/", }, { name: "GLSA-202208-32", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-32", }, { name: "https://support.apple.com/kb/HT213488", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "GLSA-202305-16", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202305-16", }, ], }, source: { advisory: "e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", discovery: "EXTERNAL", }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.2.4925", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "13.0", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1629", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-126", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", }, { name: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", refsource: "CONFIRM", tags: [ "Exploit", "Third Party Advisory", ], url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, { name: "FEDORA-2022-8df66cdbef", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/", }, { name: "GLSA-202208-32", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { name: "https://support.apple.com/kb/HT213488", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "GLSA-202305-16", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202305-16", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2023-06-27T16:21Z", publishedDate: "2022-05-10T14:15Z", }, }, }
var-202205-0881
Vulnerability from variot
Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution. vim/vim Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html
- Solution:
For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html
Details on how to access this content are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html
- Bugs fixed (https://bugzilla.redhat.com/):
2042536 - OCP 4.10: nfd-topology-updater daemonset fails to get created on worker nodes - forbidden: unable to validate against any security context constraint
2042652 - Unable to deploy hw-event-proxy operator
2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
2047308 - Remove metrics and events for master port offsets
2055049 - No pre-caching for NFD images
2055436 - nfd-master tracking the wrong api group
2055439 - nfd-master tracking the wrong api group (operand)
2057569 - nfd-worker: drop 'custom-' prefix from matchFeatures custom rules
2058256 - LeaseDuration for NFD Operator seems to be rather small, causing Operator restarts when running etcd defrag
2062849 - hw event proxy is not binding on ipv6 local address
2066860 - Wrong spec in NFD documentation under operand
2066887 - Dependabot alert: Path traversal in github.com/valyala/fasthttp
2066889 - Dependabot alert: Path traversal in github.com/valyala/fasthttp
2067312 - PPT event source is lost when received by the consumer
2077243 - NFD os release label lost after upgrade to ocp 4.10.6
2087511 - NFD SkipRange is wrong causing OLM install problems
2089962 - Node feature Discovery operator installation failed.
2090774 - Add Readme to plugin directory
2091106 - Dependabot alert: Unhandled exception in gopkg.in/yaml.v3
2091142 - Dependabot alert: Unhandled exception in gopkg.in/yaml.v3
2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS
- Summary:
The Migration Toolkit for Containers (MTC) 1.7.3 is now available. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Bug Fix(es):
-
Velero and Restic are using incorrect SCCs [OADP-BL] (BZ#2082216)
-
[MTC] Migrations gets stuck at StageBackup stage for indirect runs [OADP-BL] (BZ#2091965)
-
MTC: 1.7.1 on OCP 4.6: UI is stuck in "Discovering persistent volumes attached to source projects" step (BZ#2099856)
-
Correct DNS validation for destination namespace (BZ#2102231)
-
Deselecting all pvcs from UI still results in an attempted PVC transfer (BZ#2106073)
-
Bugs fixed (https://bugzilla.redhat.com/):
2076133 - CVE-2022-1365 cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor 2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode 2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar 2082216 - Velero and Restic are using incorrect SCCs [OADP-BL] 2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group 2091965 - [MTC] Migrations gets stuck at StageBackup stage for indirect runs [OADP-BL] 2099856 - MTC: 1.7.1 on OCP 4.6: UI is stuck in "Discovering persistent volumes attached to source projects" step 2102231 - Correct DNS validation for destination namespace 2106073 - Deselecting all pvcs from UI still results in an attempted PVC transfer
- JIRA issues fixed (https://issues.jboss.org/):
MIG-1155 - Update to newer ansible runner image for hooks MIG-1242 - Must set upper bound on OADP dep to prevent jump to 1.1 MIG-1254 - Investigate impact of deprecated Docker V2 Schema 1 for MTC on OCP3.11
- Description:
Release osp-director-operator images
Security Fix(es):
- go-getter: unsafe download (issue 1 of 3) [Important] (CVE-2022-30321)
- go-getter: unsafe download (issue 2 of 3) [Important] (CVE-2022-30322)
- go-getter: unsafe download (issue 3 of 3) [Important] (CVE-2022-30323)
- go-getter: command injection vulnerability [Important] (CVE-2022-26945)
- golang.org/x/crypto: empty plaintext packet causes panic [Moderate] (CVE-2021-43565)
-
containerd: insufficiently restricted permissions on container root and plugin directories [Moderate] (CVE-2021-41103)
-
Solution:
OSP 16.2 Release - OSP Director Operator Containers tech preview
- Bugs fixed (https://bugzilla.redhat.com/):
2011007 - CVE-2021-41103 containerd: insufficiently restricted permissions on container root and plugin directories 2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic 2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3) 2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3) 2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3) 2092928 - CVE-2022-26945 go-getter: command injection vulnerability
- Bugs fixed (https://bugzilla.redhat.com/):
2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS
- JIRA issues fixed (https://issues.jboss.org/):
LOG-2536 - Setting up ODF S3 for loki
LOG-2640 - [release-5.4] FluentdQueueLengthIncreasing rule failing to be evaluated.
LOG-2757 - [release-5.4] index rollover cronjob fails on openshift-logging operator
LOG-2762 - [release-5.4]Events and CLO csv are not collected after running oc adm must-gather --image=$downstream-clo-image
LOG-2780 - Loki cannot send logs after upgrade to 5.4.3 from 5.4.2 with 'http'
LOG-2781 - OpenShift Logging Dashboard for Elastic Shards shows "active_primary" instead of "active" shards.
LOG-2786 - [release-5.4] Token not added to Vector config when forwarding logs to Lokistack with Token+CA bundle.
LOG-2791 - [release-5.4] ElasticSearch operator does not respect referencePolicy when selecting oauth-proxy image
- Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
- Description:
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
-
vim: heap buffer overflow (CVE-2022-1621)
-
vim: buffer over-read (CVE-2022-1629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):
2083924 - CVE-2022-1621 vim: heap buffer overflow 2083931 - CVE-2022-1629 vim: buffer over-read
- Package List:
Red Hat Enterprise Linux AppStream (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: OpenShift Virtualization 4.11.0 Images security and bug fix update Advisory ID: RHSA-2022:6526-01 Product: cnv Advisory URL: https://access.redhat.com/errata/RHSA-2022:6526 Issue date: 2022-09-14 CVE Names: CVE-2018-25032 CVE-2019-5827 CVE-2019-13750 CVE-2019-13751 CVE-2019-17594 CVE-2019-17595 CVE-2019-18218 CVE-2019-19603 CVE-2019-20838 CVE-2020-13435 CVE-2020-14155 CVE-2020-17541 CVE-2020-24370 CVE-2020-35492 CVE-2021-3580 CVE-2021-3634 CVE-2021-3737 CVE-2021-4115 CVE-2021-4189 CVE-2021-20231 CVE-2021-20232 CVE-2021-23177 CVE-2021-25219 CVE-2021-31535 CVE-2021-31566 CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 CVE-2021-36087 CVE-2021-38185 CVE-2021-38561 CVE-2021-40528 CVE-2021-43527 CVE-2021-44716 CVE-2021-44717 CVE-2022-0778 CVE-2022-1271 CVE-2022-1292 CVE-2022-1621 CVE-2022-1629 CVE-2022-1798 CVE-2022-2068 CVE-2022-2097 CVE-2022-21698 CVE-2022-22576 CVE-2022-23772 CVE-2022-23773 CVE-2022-23806 CVE-2022-24407 CVE-2022-24675 CVE-2022-24921 CVE-2022-25313 CVE-2022-25314 CVE-2022-27191 CVE-2022-27774 CVE-2022-27776 CVE-2022-27782 CVE-2022-28327 CVE-2022-29824 ==================================================================== 1. Summary:
Red Hat OpenShift Virtualization release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.11.0 images:
RHEL-8-CNV-4.11 ==============hostpath-provisioner-container-v4.11.0-21 kubevirt-tekton-tasks-operator-container-v4.11.0-29 kubevirt-template-validator-container-v4.11.0-17 bridge-marker-container-v4.11.0-26 hostpath-csi-driver-container-v4.11.0-21 cluster-network-addons-operator-container-v4.11.0-26 ovs-cni-marker-container-v4.11.0-26 virtio-win-container-v4.11.0-16 ovs-cni-plugin-container-v4.11.0-26 kubemacpool-container-v4.11.0-26 hostpath-provisioner-operator-container-v4.11.0-24 cnv-containernetworking-plugins-container-v4.11.0-26 kubevirt-ssp-operator-container-v4.11.0-54 virt-cdi-uploadserver-container-v4.11.0-59 virt-cdi-cloner-container-v4.11.0-59 virt-cdi-operator-container-v4.11.0-59 virt-cdi-importer-container-v4.11.0-59 virt-cdi-uploadproxy-container-v4.11.0-59 virt-cdi-controller-container-v4.11.0-59 virt-cdi-apiserver-container-v4.11.0-59 kubevirt-tekton-tasks-modify-vm-template-container-v4.11.0-7 kubevirt-tekton-tasks-create-vm-from-template-container-v4.11.0-7 kubevirt-tekton-tasks-copy-template-container-v4.11.0-7 checkup-framework-container-v4.11.0-67 kubevirt-tekton-tasks-cleanup-vm-container-v4.11.0-7 kubevirt-tekton-tasks-disk-virt-sysprep-container-v4.11.0-7 kubevirt-tekton-tasks-wait-for-vmi-status-container-v4.11.0-7 kubevirt-tekton-tasks-disk-virt-customize-container-v4.11.0-7 vm-network-latency-checkup-container-v4.11.0-67 kubevirt-tekton-tasks-create-datavolume-container-v4.11.0-7 hyperconverged-cluster-webhook-container-v4.11.0-95 cnv-must-gather-container-v4.11.0-62 hyperconverged-cluster-operator-container-v4.11.0-95 kubevirt-console-plugin-container-v4.11.0-83 virt-controller-container-v4.11.0-105 virt-handler-container-v4.11.0-105 virt-operator-container-v4.11.0-105 virt-launcher-container-v4.11.0-105 virt-artifacts-server-container-v4.11.0-105 virt-api-container-v4.11.0-105 libguestfs-tools-container-v4.11.0-105 hco-bundle-registry-container-v4.11.0-587
Security Fix(es):
-
golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
-
kubeVirt: Arbitrary file read on the host from KubeVirt VMs (CVE-2022-1798)
-
golang: out-of-bounds read in golang.org/x/text/language leads to DoS (CVE-2021-38561)
-
golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)
-
prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
-
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
-
golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
-
golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)
-
golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
-
golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
-
golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
-
golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1937609 - VM cannot be restarted
1945593 - Live migration should be blocked for VMs with host devices
1968514 - [RFE] Add cancel migration action to virtctl
1993109 - CNV MacOS Client not signed
1994604 - [RFE] - Add a feature to virtctl to print out a message if virtctl is a different version than the server side
2001385 - no "name" label in virt-operator pod
2009793 - KBase to clarify nested support status is missing
2010318 - with sysprep config data as cfgmap volume and as cdrom disk a windows10 VMI fails to LiveMigrate
2025276 - No permissions when trying to clone to a different namespace (as Kubeadmin)
2025401 - [TEST ONLY] [CNV+OCS/ODF] Virtualization poison pill implemenation
2026357 - Migration in sequence can be reported as failed even when it succeeded
2029349 - cluster-network-addons-operator does not serve metrics through HTTPS
2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache
2030806 - CVE-2021-44717 golang: syscall: don't close fd 0 on ForkExec error
2031857 - Add annotation for URL to download the image
2033077 - KubeVirtComponentExceedsRequestedMemory Prometheus Rule is Failing to Evaluate
2035344 - kubemacpool-mac-controller-manager not ready
2036676 - NoReadyVirtController and NoReadyVirtOperator are never triggered
2039976 - Pod stuck in "Terminating" state when removing VM with kernel boot and container disks
2040766 - A crashed Windows VM cannot be restarted with virtctl or the UI
2041467 - [SSP] Support custom DataImportCron creating in custom namespaces
2042402 - LiveMigration with postcopy misbehave when failure occurs
2042809 - sysprep disk requires autounattend.xml if an unattend.xml exists
2045086 - KubeVirtComponentExceedsRequestedMemory Prometheus Rule is Failing to Evaluate
2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
2047186 - When entering to a RH supported template, it changes the project (namespace) to ?OpenShift?
2051899 - 4.11.0 containers
2052094 - [rhel9-cnv] VM fails to start, virt-handler error msg: Couldn't configure ip nat rules
2052466 - Event does not include reason for inability to live migrate
2052689 - Overhead Memory consumption calculations are incorrect
2053429 - CVE-2022-23806 golang: crypto/elliptic: IsOnCurve returns true for invalid field elements
2053532 - CVE-2022-23772 golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString
2053541 - CVE-2022-23773 golang: cmd/go: misinterpretation of branch names can lead to incorrect access control
2056467 - virt-template-validator pods getting scheduled on the same node
2057157 - [4.10.0] HPP-CSI-PVC fails to bind PVC when node fqdn is long
2057310 - qemu-guest-agent does not report information due to selinux denials
2058149 - cluster-network-addons-operator deployment's MULTUS_IMAGE is pointing to brew image
2058925 - Must-gather: for vms with longer name, gather_vms_details fails to collect qemu, dump xml logs
2059121 - [CNV-4.11-rhel9] virt-handler pod CrashLoopBackOff state
2060485 - virtualMachine with duplicate interfaces name causes MACs to be rejected by Kubemacpool
2060585 - [SNO] Failed to find the virt-controller leader pod
2061208 - Cannot delete network Interface if VM has multiqueue for networking enabled.
2061723 - Prevent new DataImportCron to manage DataSource if multiple DataImportCron pointing to same DataSource
2063540 - [CNV-4.11] Authorization Failed When Cloning Source Namespace
2063792 - No DataImportCron for CentOS 7
2064034 - On an upgraded cluster NetworkAddonsConfig seems to be reconciling in a loop
2064702 - CVE-2022-27191 golang: crash in a golang.org/x/crypto/ssh server
2064857 - CVE-2022-24921 golang: regexp: stack exhaustion via a deeply nested expression
2064936 - Migration of vm from VMware reports pvc not large enough
2065014 - Feature Highlights in CNV 4.10 contains links to 4.7
2065019 - "Running VMs per template" in the new overview tab counts VMs that are not running
2066768 - [CNV-4.11-HCO] User Cannot List Resource "namespaces" in API group
2067246 - [CNV]: Unable to ssh to Virtual Machine post changing Flavor tiny to custom
2069287 - Two annotations for VM Template provider name
2069388 - [CNV-4.11] kubemacpool-mac-controller - TLS handshake error
2070366 - VM Snapshot Restore hangs indefinitely when backed by a snapshotclass
2070864 - non-privileged user cannot see catalog tiles
2071488 - "Migrate Node to Node" is confusing.
2071549 - [rhel-9] unable to create a non-root virt-launcher based VM
2071611 - Metrics documentation generators are missing metrics/recording rules
2071921 - Kubevirt RPM is not being built
2073669 - [rhel-9] VM fails to start
2073679 - [rhel-8] VM fails to start: missing virt-launcher-monitor downstream
2073982 - [CNV-4.11-RHEL9] 'virtctl' binary fails with 'rc1' with 'virtctl version' command
2074337 - VM created from registry cannot be started
2075200 - VLAN filtering cannot be configured with Intel X710
2075409 - [CNV-4.11-rhel9] hco-operator and hco-webhook pods CrashLoopBackOff
2076292 - Upgrade from 4.10.1->4.11 using nightly channel, is not completing with error "could not complete the upgrade process. KubeVirt is not with the expected version. Check KubeVirt observed version in the status field of its CR"
2076379 - must-gather: ruletables and qemu logs collected as a part of gather_vm_details scripts are zero bytes file
2076790 - Alert SSPDown is constantly in Firing state
2076908 - clicking on a template in the Running VMs per Template card leads to 404
2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode
2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar
2078700 - Windows template boot source should be blank
2078703 - [RFE] Please hide the user defined password when customizing cloud-init
2078709 - VM conditions column have wrong key/values
2078728 - Common template rootDisk is not named correctly
2079366 - rootdisk is not able to edit
2079674 - Configuring preferred node affinity in the console results in wrong yaml and unschedulable VM
2079783 - Actions are broken in topology view
2080132 - virt-launcher logs live migration in nanoseconds if the migration is stuck
2080155 - [RFE] Provide the progress of VM migration in the source virt launcher pod
2080547 - Metrics kubevirt_hco_out_of_band_modifications_count, does not reflect correct modification count when label is added to priorityclass/kubevirt-cluster-critical in a loop
2080833 - Missing cloud init script editor in the scripts tab
2080835 - SSH key is set using cloud init script instead of new api
2081182 - VM SSH command generated by UI points at api VIP
2081202 - cloud-init for Windows VM generated with corrupted "undefined" section
2081409 - when viewing a common template details page, user need to see the message "can't edit common template" on all tabs
2081671 - SSH service created outside the UI is not discoverable
2081831 - [RFE] Improve disk hotplug UX
2082008 - LiveMigration fails due to loss of connection to destination host
2082164 - Migration progress timeout expects absolute progress
2082912 - [CNV-4.11] HCO Being Unable to Reconcile State
2083093 - VM overview tab is crashed
2083097 - ?Mount Windows drivers disk? should not show when the template is not ?windows?
2083100 - Something keeps loading in the ?node selector? modal
2083101 - ?Restore default settings? never become available while editing CPU/Memory
2083135 - VM fails to schedule with vTPM in spec
2083256 - SSP Reconcile logging improvement when CR resources are changed
2083595 - [RFE] Disable VM descheduler if the VM is not live migratable
2084102 - [e2e] Many elements are lacking proper selector like 'data-test-id' or 'data-test'
2084122 - [4.11]Clone from filesystem to block on storage api with the same size fails
2084418 - ?Invalid SSH public key format? appears when drag ssh key file to ?Authorized SSH Key? field
2084431 - User credentials for ssh is not in correct format
2084476 - The Virtual Machine Authorized SSH Key is not shown in the scripts tab.
2084532 - Console is crashed while detaching disk
2084610 - Newly added Kubevirt-plugin pod is missing resources.requests values (cpu/memory)
2085320 - Tolerations rules is not adding correctly
2085322 - Not able to stop/restart VM if the VM is staying in "Starting"
2086272 - [dark mode] Titles in Overview tab not visible enough in dark mode
2086278 - Cloud init script edit add " hostname='' " when is should not be added
2086281 - [dark mode] Helper text in Scripts tab not visible enough on dark mode
2086286 - [dark mode] The contrast of the Labels and edit labels not look good in the dark mode
2086293 - [dark mode] Titles in Parameters tab not visible enough in dark mode
2086294 - [dark mode] Can't see the number inside the donut chart in VMs per template card
2086303 - non-priv user can't create VM when namespace is not selected
2086479 - some modals use ?Save? and some modals use ?Submit?
2086486 - cluster overview getting started card include old information
2086488 - Cannot cancel vm migration if the migration pod is not schedulable in the backend
2086769 - Missing vm.kubevirt.io/template.namespace label when creating VM with the wizard
2086803 - When clonnig a template we need to update vm labels and annotaions to match new template
2086825 - VM restore PVC uses exact source PVC request size
2086849 - Create from YAML example is not runnable
2087188 - When VM is stopped - adding disk failed to show
2087189 - When VM is stopped - adding disk failed to show
2087232 - When chosing a vm or template while in all-namespace, and returning to list, namespace is changed
2087546 - "Quick Starts" is missing in Getting started card
2087547 - Activity and Status card are missing in Virtualization Overview
2087559 - template in "VMs per template" should take user to vm list page
2087566 - Remove the ?auto upload? label from template in the catalog if the auto-upload boot source not exists
2087570 - Page title should be ?VirtualMachines? and not ?Virtual Machines?
2087577 - "VMs per template" load time is a bit long
2087578 - Terminology "VM" should be "Virtual Machine" in all places
2087582 - Remove VMI and MTV from the navigation
2087583 - [RFE] Show more info about boot source in template list
2087584 - Template provider should not be mandatory
2087587 - Improve the descriptive text in the kebab menu of template
2087589 - Red icons shows in storage disk source selection without a good reason
2087590 - [REF] "Upload a new file to a PVC" should not open the form in a new tab
2087593 - "Boot method" is not a good name in overview tab
2087603 - Align details card for single VM overview with the design doc
2087616 - align the utilization card of single VM overview with the design
2087701 - [RFE] Missing a link to VMI from running VM details page
2087717 - Message when editing template boot source is wrong
2088034 - Virtualization Overview crashes when a VirtualMachine has no labels
2088355 - disk modal shows all storage classes as default
2088361 - Attached disk keeps in loading status when add disk to a power off VM by non-privileged user
2088379 - Create VM from catalog does not respect the storageclass of the template's boot source
2088407 - Missing create button in the template list
2088471 - [HPP] hostpath-provisioner-csi does not comply with restricted security context
2088472 - Golden Images import cron jobs are not getting updated on upgrade to 4.11
2088477 - [4.11.z] VMSnapshot restore fails to provision volume with size mismatch error
2088849 - "dataimportcrontemplate.kubevirt.io/enable" field does not do any validation
2089078 - ConsolePlugin kubevirt-plugin is not getting reconciled by hco
2089271 - Virtualization appears twice in sidebar
2089327 - add network modal crash when no networks available
2089376 - Virtual Machine Template without dataVolumeTemplates gets blank page
2089477 - [RFE] Allow upload source when adding VM disk
2089700 - Drive column in Disks card of Overview page has duplicated values
2089745 - When removing all disks from customize wizard app crashes
2089789 - Add windows drivers disk is missing when template is not windows
2089825 - Top consumers card on Virtualization Overview page should keep display parameters as set by user
2089836 - Card titles on single VM Overview page does not have hyperlinks to relevant pages
2089840 - Cant create snapshot if VM is without disks
2089877 - Utilization card on single VM overview - timespan menu lacks 5min option
2089932 - Top consumers card on single VM overview - View by resource dropdown menu needs an update
2089942 - Utilization card on single VM overview - trend charts at the bottom should be linked to proper metrics
2089954 - Details card on single VM overview - VNC console has grey padding
2089963 - Details card on single VM overview - Operating system info is not available
2089967 - Network Interfaces card on single VM overview - name tooltip lacks info
2089970 - Network Interfaces card on single VM overview - IP tooltip
2089972 - Disks card on single VM overview -typo
2089979 - Single VM Details - CPU|Memory edit icon misplaced
2089982 - Single VM Details - SSH modal has redundant VM name
2090035 - Alert card is missing in single VM overview
2090036 - OS should be "Operating system" and host should be "hostname" in single vm overview
2090037 - Add template link in single vm overview details card
2090038 - The update field under the version in overview should be consistent with the operator page
2090042 - Move the edit button close to the text for "boot order" and "ssh access"
2090043 - "No resource selected" in vm boot order
2090046 - Hardware devices section In the VM details and Template details should be aligned with catalog page
2090048 - "Boot mode" should be editable while VM is running
2090054 - Services ?kubernetes" and "openshift" should not be listing in vm details
2090055 - Add link to vm template in vm details page
2090056 - "Something went wrong" shows on VM "Environment" tab
2090057 - "?" icon is too big in environment and disk tab
2090059 - Failed to add configmap in environment tab due to validate error
2090064 - Miss "remote desktop" in console dropdown list for windows VM
2090066 - [RFE] Improve guest login credentials
2090068 - Make the "name" and "Source" column wider in vm disk tab
2090131 - Key's value in "add affinity rule" modal is too small
2090350 - memory leak in virt-launcher process
2091003 - SSH service is not deleted along the VM
2091058 - After VM gets deleted, the user is redirected to a page with a different namespace
2091309 - While disabling a golden image via HCO, user should not be required to enter the whole spec.
2091406 - wrong template namespace label when creating a vm with wizard
2091754 - Scheduling and scripts tab should be editable while the VM is running
2091755 - Change bottom "Save" to "Apply" on cloud-init script form
2091756 - The root disk of cloned template should be editable
2091758 - "OS" should be "Operating system" in template filter
2091760 - The provider should be empty if it's not set during cloning
2091761 - Miss "Edit labels" and "Edit annotations" in template kebab button
2091762 - Move notification above the tabs in template details page
2091764 - Clone a template should lead to the template details
2091765 - "Edit bootsource" is keeping in load in template actions dropdown
2091766 - "Are you sure you want to leave this page?" pops up when click the "Templates" link
2091853 - On Snapshot tab of single VM "Restore" button should move to the kebab actions together with the Delete
2091863 - BootSource edit modal should list affected templates
2091868 - Catalog list view has two columns named "BootSource"
2091889 - Devices should be editable for customize template
2091897 - username is missing in the generated ssh command
2091904 - VM is not started if adding "Authorized SSH Key" during vm creation
2091911 - virt-launcher pod remains as NonRoot after LiveMigrating VM from NonRoot to Root
2091940 - SSH is not enabled in vm details after restart the VM
2091945 - delete a template should lead to templates list
2091946 - Add disk modal shows wrong units
2091982 - Got a lot of "Reconciler error" in cdi-deployment log after adding custom DataImportCron to hco
2092048 - When Boot from CD is checked in customized VM creation - Disk source should be Blank
2092052 - Virtualization should be omitted in Calatog breadcrumbs
2092071 - Getting started card in Virtualization overview can not be hidden.
2092079 - Error message stays even when problematic field is dismissed
2092158 - PrometheusRule kubevirt-hyperconverged-prometheus-rule is not getting reconciled by HCO
2092228 - Ensure Machine Type for new VMs is 8.6
2092230 - [RFE] Add indication/mark to deprecated template
2092306 - VM is stucking with WaitingForVolumeBinding if creating via "Boot from CD"
2092337 - os is empty in VM details page
2092359 - [e2e] data-test-id includes all pvc name
2092654 - [RFE] No obvious way to delete the ssh key from the VM
2092662 - No url example for rhel and windows template
2092663 - no hyperlink for URL example in disk source "url"
2092664 - no hyperlink to the cdi uploadproxy URL
2092781 - Details card should be removed for non admins.
2092783 - Top consumers' card should be removed for non admins.
2092787 - Operators links should be removed from Getting started card
2092789 - "Learn more about Operators" link should lead to the Red Hat documentation
2092951 - ?Edit BootSource? action should have more explicit information when disabled
2093282 - Remove links to 'all-namespaces/' for non-privileged user
2093691 - Creation flow drawer left padding is broken
2093713 - Required fields in creation flow should be highlighted if empty
2093715 - Optional parameters section in creation flow is missing bottom padding
2093716 - CPU|Memory modal button should say "Restore template settings?
2093772 - Add a service in environment it reminds a pending change in boot order
2093773 - Console crashed if adding a service without serial number
2093866 - Cannot create vm from the template vm-template-example
2093867 - OS for template 'vm-template-example' should matching the version of the image
2094202 - Cloud-init username field should have hint
2094207 - Cloud-init password field should have auto-generate option
2094208 - SSH key input is missing validation
2094217 - YAML view should reflect shanges in SSH form
2094222 - "?" icon should be placed after red asterisk in required fields
2094323 - Workload profile should be editable in template details page
2094405 - adding resource on enviornment isnt showing on disks list when vm is running
2094440 - Utilization pie charts figures are not based on current data
2094451 - PVC selection in VM creation flow does not work for non-priv user
2094453 - CD Source selection in VM creation flow is missing Upload option
2094465 - Typo in Source tooltip
2094471 - Node selector modal for non-privileged user
2094481 - Tolerations modal for non-privileged user
2094486 - Add affinity rule modal
2094491 - Affinity rules modal button
2094495 - Descheduler modal has same text in two lines
2094646 - [e2e] Elements on scheduling tab are missing proper data-test-id
2094665 - Dedicated Resources modal for non-privileged user
2094678 - Secrets and ConfigMaps can't be added to Windows VM
2094727 - Creation flow should have VM info in header row
2094807 - hardware devices dropdown has group title even with no devices in cluster
2094813 - Cloudinit password is seen in wizard
2094848 - Details card on Overview page - 'View details' link is missing
2095125 - OS is empty in the clone modal
2095129 - "undefined" appears in rootdisk line in clone modal
2095224 - affinity modal for non-privileged users
2095529 - VM migration cancelation in kebab action should have shorter name
2095530 - Column sizes in VM list view
2095532 - Node column in VM list view is visible to non-privileged user
2095537 - Utilization card information should display pie charts as current data and sparkline charts as overtime
2095570 - Details tab of VM should not have Node info for non-privileged user
2095573 - Disks created as environment or scripts should have proper label
2095953 - VNC console controls layout
2095955 - VNC console tabs
2096166 - Template "vm-template-example" is binding with namespace "default"
2096206 - Inconsistent capitalization in Template Actions
2096208 - Templates in the catalog list is not sorted
2096263 - Incorrectly displaying units for Disks size or Memory field in various places
2096333 - virtualization overview, related operators title is not aligned
2096492 - Cannot create vm from a cloned template if its boot source is edited
2096502 - "Restore template settings" should be removed from template CPU editor
2096510 - VM can be created without any disk
2096511 - Template shows "no Boot Source" and label "Source available" at the same time
2096620 - in templates list, edit boot reference kebab action opens a modal with different title
2096781 - Remove boot source provider while edit boot source reference
2096801 - vnc thumbnail in virtual machine overview should be active on page load
2096845 - Windows template's scripts tab is crashed
2097328 - virtctl guestfs shouldn't required uid = 0
2097370 - missing titles for optional parameters in wizard customization page
2097465 - Count is not updating for 'prometheusrule' component when metrics kubevirt_hco_out_of_band_modifications_count executed
2097586 - AccessMode should stay on ReadWriteOnce while editing a disk with storage class HPP
2098134 - "Workload profile" column is not showing completely in template list
2098135 - Workload is not showing correct in catalog after change the template's workload
2098282 - Javascript error when changing boot source of custom template to be an uploaded file
2099443 - No "Quick create virtualmachine" button for template 'vm-template-example'
2099533 - ConsoleQuickStart for HCO CR's VM is missing
2099535 - The cdi-uploadproxy certificate url should be opened in a new tab
2099539 - No storage option for upload while editing a disk
2099566 - Cloudinit should be replaced by cloud-init in all places
2099608 - "DynamicB" shows in vm-example disk size
2099633 - Doc links needs to be updated
2099639 - Remove user line from the ssh command section
2099802 - Details card link shouldn't be hard-coded
2100054 - Windows VM with WSL2 guest fails to migrate
2100284 - Virtualization overview is crashed
2100415 - HCO is taking too much time for reconciling kubevirt-plugin deployment
2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS
2101164 - [dark mode] Number of alerts in Alerts card not visible enough in dark mode
2101192 - AccessMode should stay on ReadWriteOnce while editing a disk with storage class HPP
2101430 - Using CLOUD_USER_PASSWORD in Templates parameters breaks VM review page
2101454 - Cannot add PVC boot source to template in 'Edit Boot Source Reference' view as a non-priv user
2101485 - Cloudinit should be replaced by cloud-init in all places
2101628 - non-priv user cannot load dataSource while edit template's rootdisk
2101954 - [4.11]Smart clone and csi clone leaves tmp unbound PVC and ObjectTransfer
2102076 - Using CLOUD_USER_PASSWORD in Templates parameters breaks VM review page
2102116 - [e2e] elements on Template Scheduling tab are missing proper data-test-id
2102117 - [e2e] elements on VM Scripts tab are missing proper data-test-id
2102122 - non-priv user cannot load dataSource while edit template's rootdisk
2102124 - Cannot add PVC boot source to template in 'Edit Boot Source Reference' view as a non-priv user
2102125 - vm clone modal is displaying DV size instead of PVC size
2102127 - Cannot add NIC to VM template as non-priv user
2102129 - All templates are labeling "source available" in template list page
2102131 - The number of hardware devices is not correct in vm overview tab
2102135 - [dark mode] Number of alerts in Alerts card not visible enough in dark mode
2102143 - vm clone modal is displaying DV size instead of PVC size
2102256 - Add button moved to right
2102448 - VM disk is deleted by uncheck "Delete disks (1x)" on delete modal
2102543 - Add button moved to right
2102544 - VM disk is deleted by uncheck "Delete disks (1x)" on delete modal
2102545 - VM filter has two "Other" checkboxes which are triggered together
2104617 - Storage status report "OpenShift Data Foundation is not available" even the operator is installed
2106175 - All pages are crashed after visit Virtualization -> Overview
2106258 - All pages are crashed after visit Virtualization -> Overview
2110178 - [Docs] Text repetition in Virtual Disk Hot plug instructions
2111359 - kubevirt plugin console is crashed after creating a vm with 2 nics
2111562 - kubevirt plugin console crashed after visit vmi page
2117872 - CVE-2022-1798 kubeVirt: Arbitrary file read on the host from KubeVirt VMs
- References:
https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2019-5827 https://access.redhat.com/security/cve/CVE-2019-13750 https://access.redhat.com/security/cve/CVE-2019-13751 https://access.redhat.com/security/cve/CVE-2019-17594 https://access.redhat.com/security/cve/CVE-2019-17595 https://access.redhat.com/security/cve/CVE-2019-18218 https://access.redhat.com/security/cve/CVE-2019-19603 https://access.redhat.com/security/cve/CVE-2019-20838 https://access.redhat.com/security/cve/CVE-2020-13435 https://access.redhat.com/security/cve/CVE-2020-14155 https://access.redhat.com/security/cve/CVE-2020-17541 https://access.redhat.com/security/cve/CVE-2020-24370 https://access.redhat.com/security/cve/CVE-2020-35492 https://access.redhat.com/security/cve/CVE-2021-3580 https://access.redhat.com/security/cve/CVE-2021-3634 https://access.redhat.com/security/cve/CVE-2021-3737 https://access.redhat.com/security/cve/CVE-2021-4115 https://access.redhat.com/security/cve/CVE-2021-4189 https://access.redhat.com/security/cve/CVE-2021-20231 https://access.redhat.com/security/cve/CVE-2021-20232 https://access.redhat.com/security/cve/CVE-2021-23177 https://access.redhat.com/security/cve/CVE-2021-25219 https://access.redhat.com/security/cve/CVE-2021-31535 https://access.redhat.com/security/cve/CVE-2021-31566 https://access.redhat.com/security/cve/CVE-2021-36084 https://access.redhat.com/security/cve/CVE-2021-36085 https://access.redhat.com/security/cve/CVE-2021-36086 https://access.redhat.com/security/cve/CVE-2021-36087 https://access.redhat.com/security/cve/CVE-2021-38185 https://access.redhat.com/security/cve/CVE-2021-38561 https://access.redhat.com/security/cve/CVE-2021-40528 https://access.redhat.com/security/cve/CVE-2021-43527 https://access.redhat.com/security/cve/CVE-2021-44716 https://access.redhat.com/security/cve/CVE-2021-44717 https://access.redhat.com/security/cve/CVE-2022-0778 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-1292 https://access.redhat.com/security/cve/CVE-2022-1621 https://access.redhat.com/security/cve/CVE-2022-1629 https://access.redhat.com/security/cve/CVE-2022-1798 https://access.redhat.com/security/cve/CVE-2022-2068 https://access.redhat.com/security/cve/CVE-2022-2097 https://access.redhat.com/security/cve/CVE-2022-21698 https://access.redhat.com/security/cve/CVE-2022-22576 https://access.redhat.com/security/cve/CVE-2022-23772 https://access.redhat.com/security/cve/CVE-2022-23773 https://access.redhat.com/security/cve/CVE-2022-23806 https://access.redhat.com/security/cve/CVE-2022-24407 https://access.redhat.com/security/cve/CVE-2022-24675 https://access.redhat.com/security/cve/CVE-2022-24921 https://access.redhat.com/security/cve/CVE-2022-25313 https://access.redhat.com/security/cve/CVE-2022-25314 https://access.redhat.com/security/cve/CVE-2022-27191 https://access.redhat.com/security/cve/CVE-2022-27774 https://access.redhat.com/security/cve/CVE-2022-27776 https://access.redhat.com/security/cve/CVE-2022-27782 https://access.redhat.com/security/cve/CVE-2022-28327 https://access.redhat.com/security/cve/CVE-2022-29824 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYyJ8IdzjgjWX9erEAQh2Dw/+M+tknCYULLILonF1TEVyD12Yyo+Pabbt a4YQUX2aFlmhOOaVBRXwDMrIPJi/Mi52+Kh05PE4/q2RndH/UbY/SfmtV70UTgiO gb7r+w86fTMHc8h60G9rYfmuVvqgL1HWg7HImJHxtB5DHFcbwtUmB3/nJ5O2oiGn oQdcr2KWA0UjVqv13VffBdkYRbTREJdF/7+2eJDKvFjNiKZYxNw4tBYxgEGcasU/ W61U+E8VU9uRHwtQOUvsOM8ga+3m/qyV8eov4BjmoEUUJYJeqI7hDhn8/GBtMJgb zKL1F3+PgEVyxoZsIKT3YJTLKJd1JLdIEe05fInlcoDSnNU3WZQhNKDZzusW4Mkg B9mwZAhicKGlUNzpt3qp9clq9j/fH1IjS7PetaEBcpr9xeH8VglDLHmNqoMoNmO8 S74c2v3tl6/VnqsYo+jrLLQHbfwrbxCNi1ROpSzr2CD5E9wcyrRS9IBacZKEMYe1 810o/o7T64G9+7xy/5IkPb4lEb3fKC5huBhwZKTjJJQtl6ojLSLXECFR8+1wQTTi LD0EAKjZhVtaMDJVRCo4jL2e2cdfGHJkeIYRzcqo6EmuFzVZYUrPsqyXzERQ6+r9 ayXDJs6y+3BakK/TZi8H3jkE23POT8OqEOR34bGrcaW1BvAEG0GejXh4qEJmzhlg Jpmb+NWHfF0VHM -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0881", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vim", scope: "lt", trust: 1, vendor: "vim", version: "8.2.4925", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "35", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "34", }, { model: "macos", scope: "lt", trust: 1, vendor: "apple", version: "13.0", }, { model: "fedora", scope: null, trust: 0.8, vendor: "fedora", version: null, }, { model: "macos", scope: null, trust: 0.8, vendor: "アップル", version: null, }, { model: "vim", scope: null, trust: 0.8, vendor: "vim", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-010778", }, { db: "NVD", id: "CVE-2022-1629", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Red Hat", sources: [ { db: "PACKETSTORM", id: "167985", }, { db: "PACKETSTORM", id: "168036", }, { db: "PACKETSTORM", id: "167956", }, { db: "PACKETSTORM", id: "167778", }, { db: "PACKETSTORM", id: "167845", }, { db: "PACKETSTORM", id: "167644", }, { db: "PACKETSTORM", id: "168392", }, ], trust: 0.7, }, cve: "CVE-2022-1629", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "CVE-2022-1629", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 1.8, vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "VHN-419742", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:M/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, id: "CVE-2022-1629", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "LOW", attackVector: "LOCAL", author: "security@huntr.dev", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", exploitabilityScore: 1.8, id: "CVE-2022-1629", impactScore: 4.7, integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 7.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2022-1629", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "Required", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2022-1629", trust: 1, value: "HIGH", }, { author: "security@huntr.dev", id: "CVE-2022-1629", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "CVE-2022-1629", trust: 0.8, value: "High", }, { author: "CNNVD", id: "CNNVD-202205-2825", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-419742", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-419742", }, { db: "JVNDB", id: "JVNDB-2022-010778", }, { db: "CNNVD", id: "CNNVD-202205-2825", }, { db: "NVD", id: "CVE-2022-1629", }, { db: "NVD", id: "CVE-2022-1629", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution. vim/vim Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html\n\n3. Solution:\n\nFor OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n2042536 - OCP 4.10: nfd-topology-updater daemonset fails to get created on worker nodes - forbidden: unable to validate against any security context constraint\n2042652 - Unable to deploy hw-event-proxy operator\n2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter\n2047308 - Remove metrics and events for master port offsets\n2055049 - No pre-caching for NFD images\n2055436 - nfd-master tracking the wrong api group\n2055439 - nfd-master tracking the wrong api group (operand)\n2057569 - nfd-worker: drop 'custom-' prefix from matchFeatures custom rules\n2058256 - LeaseDuration for NFD Operator seems to be rather small, causing Operator restarts when running etcd defrag\n2062849 - hw event proxy is not binding on ipv6 local address\n2066860 - Wrong spec in NFD documentation under `operand`\n2066887 - Dependabot alert: Path traversal in github.com/valyala/fasthttp\n2066889 - Dependabot alert: Path traversal in github.com/valyala/fasthttp\n2067312 - PPT event source is lost when received by the consumer\n2077243 - NFD os release label lost after upgrade to ocp 4.10.6\n2087511 - NFD SkipRange is wrong causing OLM install problems\n2089962 - Node feature Discovery operator installation failed. \n2090774 - Add Readme to plugin directory\n2091106 - Dependabot alert: Unhandled exception in gopkg.in/yaml.v3\n2091142 - Dependabot alert: Unhandled exception in gopkg.in/yaml.v3\n2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS\n\n5. Summary:\n\nThe Migration Toolkit for Containers (MTC) 1.7.3 is now available. Description:\n\nThe Migration Toolkit for Containers (MTC) enables you to migrate\nKubernetes resources, persistent volume data, and internal container images\nbetween OpenShift Container Platform clusters, using the MTC web console or\nthe Kubernetes API. \n\nBug Fix(es):\n\n* Velero and Restic are using incorrect SCCs [OADP-BL] (BZ#2082216)\n\n* [MTC] Migrations gets stuck at StageBackup stage for indirect runs\n[OADP-BL] (BZ#2091965)\n\n* MTC: 1.7.1 on OCP 4.6: UI is stuck in \"Discovering persistent volumes\nattached to source projects\" step (BZ#2099856)\n\n* Correct DNS validation for destination namespace (BZ#2102231)\n\n* Deselecting all pvcs from UI still results in an attempted PVC transfer\n(BZ#2106073)\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n2076133 - CVE-2022-1365 cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor\n2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode\n2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar\n2082216 - Velero and Restic are using incorrect SCCs [OADP-BL]\n2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group\n2091965 - [MTC] Migrations gets stuck at StageBackup stage for indirect runs [OADP-BL]\n2099856 - MTC: 1.7.1 on OCP 4.6: UI is stuck in \"Discovering persistent volumes attached to source projects\" step\n2102231 - Correct DNS validation for destination namespace\n2106073 - Deselecting all pvcs from UI still results in an attempted PVC transfer\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nMIG-1155 - Update to newer ansible runner image for hooks\nMIG-1242 - Must set upper bound on OADP dep to prevent jump to 1.1\nMIG-1254 - Investigate impact of deprecated Docker V2 Schema 1 for MTC on OCP3.11\n\n6. Description:\n\nRelease osp-director-operator images\n\nSecurity Fix(es):\n\n* go-getter: unsafe download (issue 1 of 3) [Important] (CVE-2022-30321)\n* go-getter: unsafe download (issue 2 of 3) [Important] (CVE-2022-30322)\n* go-getter: unsafe download (issue 3 of 3) [Important] (CVE-2022-30323)\n* go-getter: command injection vulnerability [Important] (CVE-2022-26945)\n* golang.org/x/crypto: empty plaintext packet causes panic [Moderate]\n(CVE-2021-43565)\n* containerd: insufficiently restricted permissions on container root and\nplugin directories [Moderate] (CVE-2021-41103)\n\n3. Solution:\n\nOSP 16.2 Release - OSP Director Operator Containers tech preview\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n2011007 - CVE-2021-41103 containerd: insufficiently restricted permissions on container root and plugin directories\n2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic\n2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3)\n2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3)\n2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3)\n2092928 - CVE-2022-26945 go-getter: command injection vulnerability\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-2536 - Setting up ODF S3 for loki\nLOG-2640 - [release-5.4] FluentdQueueLengthIncreasing rule failing to be evaluated. \nLOG-2757 - [release-5.4] index rollover cronjob fails on openshift-logging operator\nLOG-2762 - [release-5.4]Events and CLO csv are not collected after running `oc adm must-gather --image=$downstream-clo-image `\nLOG-2780 - Loki cannot send logs after upgrade to 5.4.3 from 5.4.2 with 'http'\nLOG-2781 - OpenShift Logging Dashboard for Elastic Shards shows \"active_primary\" instead of \"active\" shards. \nLOG-2786 - [release-5.4] Token not added to Vector config when forwarding logs to Lokistack with Token+CA bundle. \nLOG-2791 - [release-5.4] ElasticSearch operator does not respect referencePolicy when selecting oauth-proxy image\n\n6. Relevant releases/architectures:\n\nRed Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. Description:\n\nVim (Vi IMproved) is an updated and improved version of the vi editor. \n\nSecurity Fix(es):\n\n* vim: heap buffer overflow (CVE-2022-1621)\n\n* vim: buffer over-read (CVE-2022-1629)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):\n\n2083924 - CVE-2022-1621 vim: heap buffer overflow\n2083931 - CVE-2022-1629 vim: buffer over-read\n\n6. Package List:\n\nRed Hat Enterprise Linux AppStream (v. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: OpenShift Virtualization 4.11.0 Images security and bug fix update\nAdvisory ID: RHSA-2022:6526-01\nProduct: cnv\nAdvisory URL: https://access.redhat.com/errata/RHSA-2022:6526\nIssue date: 2022-09-14\nCVE Names: CVE-2018-25032 CVE-2019-5827 CVE-2019-13750\n CVE-2019-13751 CVE-2019-17594 CVE-2019-17595\n CVE-2019-18218 CVE-2019-19603 CVE-2019-20838\n CVE-2020-13435 CVE-2020-14155 CVE-2020-17541\n CVE-2020-24370 CVE-2020-35492 CVE-2021-3580\n CVE-2021-3634 CVE-2021-3737 CVE-2021-4115\n CVE-2021-4189 CVE-2021-20231 CVE-2021-20232\n CVE-2021-23177 CVE-2021-25219 CVE-2021-31535\n CVE-2021-31566 CVE-2021-36084 CVE-2021-36085\n CVE-2021-36086 CVE-2021-36087 CVE-2021-38185\n CVE-2021-38561 CVE-2021-40528 CVE-2021-43527\n CVE-2021-44716 CVE-2021-44717 CVE-2022-0778\n CVE-2022-1271 CVE-2022-1292 CVE-2022-1621\n CVE-2022-1629 CVE-2022-1798 CVE-2022-2068\n CVE-2022-2097 CVE-2022-21698 CVE-2022-22576\n CVE-2022-23772 CVE-2022-23773 CVE-2022-23806\n CVE-2022-24407 CVE-2022-24675 CVE-2022-24921\n CVE-2022-25313 CVE-2022-25314 CVE-2022-27191\n CVE-2022-27774 CVE-2022-27776 CVE-2022-27782\n CVE-2022-28327 CVE-2022-29824\n====================================================================\n1. Summary:\n\nRed Hat OpenShift Virtualization release 4.11.0 is now available with\nupdates to packages and images that fix several bugs and add enhancements. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Description:\n\nOpenShift Virtualization is Red Hat's virtualization solution designed for\nRed Hat OpenShift Container Platform. \n\nThis advisory contains the following OpenShift Virtualization 4.11.0\nimages:\n\nRHEL-8-CNV-4.11\n==============hostpath-provisioner-container-v4.11.0-21\nkubevirt-tekton-tasks-operator-container-v4.11.0-29\nkubevirt-template-validator-container-v4.11.0-17\nbridge-marker-container-v4.11.0-26\nhostpath-csi-driver-container-v4.11.0-21\ncluster-network-addons-operator-container-v4.11.0-26\novs-cni-marker-container-v4.11.0-26\nvirtio-win-container-v4.11.0-16\novs-cni-plugin-container-v4.11.0-26\nkubemacpool-container-v4.11.0-26\nhostpath-provisioner-operator-container-v4.11.0-24\ncnv-containernetworking-plugins-container-v4.11.0-26\nkubevirt-ssp-operator-container-v4.11.0-54\nvirt-cdi-uploadserver-container-v4.11.0-59\nvirt-cdi-cloner-container-v4.11.0-59\nvirt-cdi-operator-container-v4.11.0-59\nvirt-cdi-importer-container-v4.11.0-59\nvirt-cdi-uploadproxy-container-v4.11.0-59\nvirt-cdi-controller-container-v4.11.0-59\nvirt-cdi-apiserver-container-v4.11.0-59\nkubevirt-tekton-tasks-modify-vm-template-container-v4.11.0-7\nkubevirt-tekton-tasks-create-vm-from-template-container-v4.11.0-7\nkubevirt-tekton-tasks-copy-template-container-v4.11.0-7\ncheckup-framework-container-v4.11.0-67\nkubevirt-tekton-tasks-cleanup-vm-container-v4.11.0-7\nkubevirt-tekton-tasks-disk-virt-sysprep-container-v4.11.0-7\nkubevirt-tekton-tasks-wait-for-vmi-status-container-v4.11.0-7\nkubevirt-tekton-tasks-disk-virt-customize-container-v4.11.0-7\nvm-network-latency-checkup-container-v4.11.0-67\nkubevirt-tekton-tasks-create-datavolume-container-v4.11.0-7\nhyperconverged-cluster-webhook-container-v4.11.0-95\ncnv-must-gather-container-v4.11.0-62\nhyperconverged-cluster-operator-container-v4.11.0-95\nkubevirt-console-plugin-container-v4.11.0-83\nvirt-controller-container-v4.11.0-105\nvirt-handler-container-v4.11.0-105\nvirt-operator-container-v4.11.0-105\nvirt-launcher-container-v4.11.0-105\nvirt-artifacts-server-container-v4.11.0-105\nvirt-api-container-v4.11.0-105\nlibguestfs-tools-container-v4.11.0-105\nhco-bundle-registry-container-v4.11.0-587\n\nSecurity Fix(es):\n\n* golang: net/http: limit growth of header canonicalization cache\n(CVE-2021-44716)\n\n* kubeVirt: Arbitrary file read on the host from KubeVirt VMs\n(CVE-2022-1798)\n\n* golang: out-of-bounds read in golang.org/x/text/language leads to DoS\n(CVE-2021-38561)\n\n* golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)\n\n* prometheus/client_golang: Denial of service using\nInstrumentHandlerCounter (CVE-2022-21698)\n\n* golang: math/big: uncontrolled memory consumption due to an unhandled\noverflow via Rat.SetString (CVE-2022-23772)\n\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect\naccess control (CVE-2022-23773)\n\n* golang: crypto/elliptic: IsOnCurve returns true for invalid field\nelements (CVE-2022-23806)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: regexp: stack exhaustion via a deeply nested expression\n(CVE-2022-24921)\n\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n\n* golang: crypto/elliptic: panic caused by oversized scalar\n(CVE-2022-28327)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n3. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1937609 - VM cannot be restarted\n1945593 - Live migration should be blocked for VMs with host devices\n1968514 - [RFE] Add cancel migration action to virtctl\n1993109 - CNV MacOS Client not signed\n1994604 - [RFE] - Add a feature to virtctl to print out a message if virtctl is a different version than the server side\n2001385 - no \"name\" label in virt-operator pod\n2009793 - KBase to clarify nested support status is missing\n2010318 - with sysprep config data as cfgmap volume and as cdrom disk a windows10 VMI fails to LiveMigrate\n2025276 - No permissions when trying to clone to a different namespace (as Kubeadmin)\n2025401 - [TEST ONLY] [CNV+OCS/ODF] Virtualization poison pill implemenation\n2026357 - Migration in sequence can be reported as failed even when it succeeded\n2029349 - cluster-network-addons-operator does not serve metrics through HTTPS\n2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache\n2030806 - CVE-2021-44717 golang: syscall: don't close fd 0 on ForkExec error\n2031857 - Add annotation for URL to download the image\n2033077 - KubeVirtComponentExceedsRequestedMemory Prometheus Rule is Failing to Evaluate\n2035344 - kubemacpool-mac-controller-manager not ready\n2036676 - NoReadyVirtController and NoReadyVirtOperator are never triggered\n2039976 - Pod stuck in \"Terminating\" state when removing VM with kernel boot and container disks\n2040766 - A crashed Windows VM cannot be restarted with virtctl or the UI\n2041467 - [SSP] Support custom DataImportCron creating in custom namespaces\n2042402 - LiveMigration with postcopy misbehave when failure occurs\n2042809 - sysprep disk requires autounattend.xml if an unattend.xml exists\n2045086 - KubeVirtComponentExceedsRequestedMemory Prometheus Rule is Failing to Evaluate\n2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter\n2047186 - When entering to a RH supported template, it changes the project (namespace) to ?OpenShift?\n2051899 - 4.11.0 containers\n2052094 - [rhel9-cnv] VM fails to start, virt-handler error msg: Couldn't configure ip nat rules\n2052466 - Event does not include reason for inability to live migrate\n2052689 - Overhead Memory consumption calculations are incorrect\n2053429 - CVE-2022-23806 golang: crypto/elliptic: IsOnCurve returns true for invalid field elements\n2053532 - CVE-2022-23772 golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString\n2053541 - CVE-2022-23773 golang: cmd/go: misinterpretation of branch names can lead to incorrect access control\n2056467 - virt-template-validator pods getting scheduled on the same node\n2057157 - [4.10.0] HPP-CSI-PVC fails to bind PVC when node fqdn is long\n2057310 - qemu-guest-agent does not report information due to selinux denials\n2058149 - cluster-network-addons-operator deployment's MULTUS_IMAGE is pointing to brew image\n2058925 - Must-gather: for vms with longer name, gather_vms_details fails to collect qemu, dump xml logs\n2059121 - [CNV-4.11-rhel9] virt-handler pod CrashLoopBackOff state\n2060485 - virtualMachine with duplicate interfaces name causes MACs to be rejected by Kubemacpool\n2060585 - [SNO] Failed to find the virt-controller leader pod\n2061208 - Cannot delete network Interface if VM has multiqueue for networking enabled. \n2061723 - Prevent new DataImportCron to manage DataSource if multiple DataImportCron pointing to same DataSource\n2063540 - [CNV-4.11] Authorization Failed When Cloning Source Namespace\n2063792 - No DataImportCron for CentOS 7\n2064034 - On an upgraded cluster NetworkAddonsConfig seems to be reconciling in a loop\n2064702 - CVE-2022-27191 golang: crash in a golang.org/x/crypto/ssh server\n2064857 - CVE-2022-24921 golang: regexp: stack exhaustion via a deeply nested expression\n2064936 - Migration of vm from VMware reports pvc not large enough\n2065014 - Feature Highlights in CNV 4.10 contains links to 4.7\n2065019 - \"Running VMs per template\" in the new overview tab counts VMs that are not running\n2066768 - [CNV-4.11-HCO] User Cannot List Resource \"namespaces\" in API group\n2067246 - [CNV]: Unable to ssh to Virtual Machine post changing Flavor tiny to custom\n2069287 - Two annotations for VM Template provider name\n2069388 - [CNV-4.11] kubemacpool-mac-controller - TLS handshake error\n2070366 - VM Snapshot Restore hangs indefinitely when backed by a snapshotclass\n2070864 - non-privileged user cannot see catalog tiles\n2071488 - \"Migrate Node to Node\" is confusing. \n2071549 - [rhel-9] unable to create a non-root virt-launcher based VM\n2071611 - Metrics documentation generators are missing metrics/recording rules\n2071921 - Kubevirt RPM is not being built\n2073669 - [rhel-9] VM fails to start\n2073679 - [rhel-8] VM fails to start: missing virt-launcher-monitor downstream\n2073982 - [CNV-4.11-RHEL9] 'virtctl' binary fails with 'rc1' with 'virtctl version' command\n2074337 - VM created from registry cannot be started\n2075200 - VLAN filtering cannot be configured with Intel X710\n2075409 - [CNV-4.11-rhel9] hco-operator and hco-webhook pods CrashLoopBackOff\n2076292 - Upgrade from 4.10.1->4.11 using nightly channel, is not completing with error \"could not complete the upgrade process. KubeVirt is not with the expected version. Check KubeVirt observed version in the status field of its CR\"\n2076379 - must-gather: ruletables and qemu logs collected as a part of gather_vm_details scripts are zero bytes file\n2076790 - Alert SSPDown is constantly in Firing state\n2076908 - clicking on a template in the Running VMs per Template card leads to 404\n2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode\n2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar\n2078700 - Windows template boot source should be blank\n2078703 - [RFE] Please hide the user defined password when customizing cloud-init\n2078709 - VM conditions column have wrong key/values\n2078728 - Common template rootDisk is not named correctly\n2079366 - rootdisk is not able to edit\n2079674 - Configuring preferred node affinity in the console results in wrong yaml and unschedulable VM\n2079783 - Actions are broken in topology view\n2080132 - virt-launcher logs live migration in nanoseconds if the migration is stuck\n2080155 - [RFE] Provide the progress of VM migration in the source virt launcher pod\n2080547 - Metrics kubevirt_hco_out_of_band_modifications_count, does not reflect correct modification count when label is added to priorityclass/kubevirt-cluster-critical in a loop\n2080833 - Missing cloud init script editor in the scripts tab\n2080835 - SSH key is set using cloud init script instead of new api\n2081182 - VM SSH command generated by UI points at api VIP\n2081202 - cloud-init for Windows VM generated with corrupted \"undefined\" section\n2081409 - when viewing a common template details page, user need to see the message \"can't edit common template\" on all tabs\n2081671 - SSH service created outside the UI is not discoverable\n2081831 - [RFE] Improve disk hotplug UX\n2082008 - LiveMigration fails due to loss of connection to destination host\n2082164 - Migration progress timeout expects absolute progress\n2082912 - [CNV-4.11] HCO Being Unable to Reconcile State\n2083093 - VM overview tab is crashed\n2083097 - ?Mount Windows drivers disk? should not show when the template is not ?windows?\n2083100 - Something keeps loading in the ?node selector? modal\n2083101 - ?Restore default settings? never become available while editing CPU/Memory\n2083135 - VM fails to schedule with vTPM in spec\n2083256 - SSP Reconcile logging improvement when CR resources are changed\n2083595 - [RFE] Disable VM descheduler if the VM is not live migratable\n2084102 - [e2e] Many elements are lacking proper selector like 'data-test-id' or 'data-test'\n2084122 - [4.11]Clone from filesystem to block on storage api with the same size fails\n2084418 - ?Invalid SSH public key format? appears when drag ssh key file to ?Authorized SSH Key? field\n2084431 - User credentials for ssh is not in correct format\n2084476 - The Virtual Machine Authorized SSH Key is not shown in the scripts tab. \n2084532 - Console is crashed while detaching disk\n2084610 - Newly added Kubevirt-plugin pod is missing resources.requests values (cpu/memory)\n2085320 - Tolerations rules is not adding correctly\n2085322 - Not able to stop/restart VM if the VM is staying in \"Starting\"\n2086272 - [dark mode] Titles in Overview tab not visible enough in dark mode\n2086278 - Cloud init script edit add \" hostname='' \" when is should not be added\n2086281 - [dark mode] Helper text in Scripts tab not visible enough on dark mode\n2086286 - [dark mode] The contrast of the Labels and edit labels not look good in the dark mode\n2086293 - [dark mode] Titles in Parameters tab not visible enough in dark mode\n2086294 - [dark mode] Can't see the number inside the donut chart in VMs per template card\n2086303 - non-priv user can't create VM when namespace is not selected\n2086479 - some modals use ?Save? and some modals use ?Submit?\n2086486 - cluster overview getting started card include old information\n2086488 - Cannot cancel vm migration if the migration pod is not schedulable in the backend\n2086769 - Missing vm.kubevirt.io/template.namespace label when creating VM with the wizard\n2086803 - When clonnig a template we need to update vm labels and annotaions to match new template\n2086825 - VM restore PVC uses exact source PVC request size\n2086849 - Create from YAML example is not runnable\n2087188 - When VM is stopped - adding disk failed to show\n2087189 - When VM is stopped - adding disk failed to show\n2087232 - When chosing a vm or template while in all-namespace, and returning to list, namespace is changed\n2087546 - \"Quick Starts\" is missing in Getting started card\n2087547 - Activity and Status card are missing in Virtualization Overview\n2087559 - template in \"VMs per template\" should take user to vm list page\n2087566 - Remove the ?auto upload? label from template in the catalog if the auto-upload boot source not exists\n2087570 - Page title should be ?VirtualMachines? and not ?Virtual Machines?\n2087577 - \"VMs per template\" load time is a bit long\n2087578 - Terminology \"VM\" should be \"Virtual Machine\" in all places\n2087582 - Remove VMI and MTV from the navigation\n2087583 - [RFE] Show more info about boot source in template list\n2087584 - Template provider should not be mandatory\n2087587 - Improve the descriptive text in the kebab menu of template\n2087589 - Red icons shows in storage disk source selection without a good reason\n2087590 - [REF] \"Upload a new file to a PVC\" should not open the form in a new tab\n2087593 - \"Boot method\" is not a good name in overview tab\n2087603 - Align details card for single VM overview with the design doc\n2087616 - align the utilization card of single VM overview with the design\n2087701 - [RFE] Missing a link to VMI from running VM details page\n2087717 - Message when editing template boot source is wrong\n2088034 - Virtualization Overview crashes when a VirtualMachine has no labels\n2088355 - disk modal shows all storage classes as default\n2088361 - Attached disk keeps in loading status when add disk to a power off VM by non-privileged user\n2088379 - Create VM from catalog does not respect the storageclass of the template's boot source\n2088407 - Missing create button in the template list\n2088471 - [HPP] hostpath-provisioner-csi does not comply with restricted security context\n2088472 - Golden Images import cron jobs are not getting updated on upgrade to 4.11\n2088477 - [4.11.z] VMSnapshot restore fails to provision volume with size mismatch error\n2088849 - \"dataimportcrontemplate.kubevirt.io/enable\" field does not do any validation\n2089078 - ConsolePlugin kubevirt-plugin is not getting reconciled by hco\n2089271 - Virtualization appears twice in sidebar\n2089327 - add network modal crash when no networks available\n2089376 - Virtual Machine Template without dataVolumeTemplates gets blank page\n2089477 - [RFE] Allow upload source when adding VM disk\n2089700 - Drive column in Disks card of Overview page has duplicated values\n2089745 - When removing all disks from customize wizard app crashes\n2089789 - Add windows drivers disk is missing when template is not windows\n2089825 - Top consumers card on Virtualization Overview page should keep display parameters as set by user\n2089836 - Card titles on single VM Overview page does not have hyperlinks to relevant pages\n2089840 - Cant create snapshot if VM is without disks\n2089877 - Utilization card on single VM overview - timespan menu lacks 5min option\n2089932 - Top consumers card on single VM overview - View by resource dropdown menu needs an update\n2089942 - Utilization card on single VM overview - trend charts at the bottom should be linked to proper metrics\n2089954 - Details card on single VM overview - VNC console has grey padding\n2089963 - Details card on single VM overview - Operating system info is not available\n2089967 - Network Interfaces card on single VM overview - name tooltip lacks info\n2089970 - Network Interfaces card on single VM overview - IP tooltip\n2089972 - Disks card on single VM overview -typo\n2089979 - Single VM Details - CPU|Memory edit icon misplaced\n2089982 - Single VM Details - SSH modal has redundant VM name\n2090035 - Alert card is missing in single VM overview\n2090036 - OS should be \"Operating system\" and host should be \"hostname\" in single vm overview\n2090037 - Add template link in single vm overview details card\n2090038 - The update field under the version in overview should be consistent with the operator page\n2090042 - Move the edit button close to the text for \"boot order\" and \"ssh access\"\n2090043 - \"No resource selected\" in vm boot order\n2090046 - Hardware devices section In the VM details and Template details should be aligned with catalog page\n2090048 - \"Boot mode\" should be editable while VM is running\n2090054 - Services ?kubernetes\" and \"openshift\" should not be listing in vm details\n2090055 - Add link to vm template in vm details page\n2090056 - \"Something went wrong\" shows on VM \"Environment\" tab\n2090057 - \"?\" icon is too big in environment and disk tab\n2090059 - Failed to add configmap in environment tab due to validate error\n2090064 - Miss \"remote desktop\" in console dropdown list for windows VM\n2090066 - [RFE] Improve guest login credentials\n2090068 - Make the \"name\" and \"Source\" column wider in vm disk tab\n2090131 - Key's value in \"add affinity rule\" modal is too small\n2090350 - memory leak in virt-launcher process\n2091003 - SSH service is not deleted along the VM\n2091058 - After VM gets deleted, the user is redirected to a page with a different namespace\n2091309 - While disabling a golden image via HCO, user should not be required to enter the whole spec. \n2091406 - wrong template namespace label when creating a vm with wizard\n2091754 - Scheduling and scripts tab should be editable while the VM is running\n2091755 - Change bottom \"Save\" to \"Apply\" on cloud-init script form\n2091756 - The root disk of cloned template should be editable\n2091758 - \"OS\" should be \"Operating system\" in template filter\n2091760 - The provider should be empty if it's not set during cloning\n2091761 - Miss \"Edit labels\" and \"Edit annotations\" in template kebab button\n2091762 - Move notification above the tabs in template details page\n2091764 - Clone a template should lead to the template details\n2091765 - \"Edit bootsource\" is keeping in load in template actions dropdown\n2091766 - \"Are you sure you want to leave this page?\" pops up when click the \"Templates\" link\n2091853 - On Snapshot tab of single VM \"Restore\" button should move to the kebab actions together with the Delete\n2091863 - BootSource edit modal should list affected templates\n2091868 - Catalog list view has two columns named \"BootSource\"\n2091889 - Devices should be editable for customize template\n2091897 - username is missing in the generated ssh command\n2091904 - VM is not started if adding \"Authorized SSH Key\" during vm creation\n2091911 - virt-launcher pod remains as NonRoot after LiveMigrating VM from NonRoot to Root\n2091940 - SSH is not enabled in vm details after restart the VM\n2091945 - delete a template should lead to templates list\n2091946 - Add disk modal shows wrong units\n2091982 - Got a lot of \"Reconciler error\" in cdi-deployment log after adding custom DataImportCron to hco\n2092048 - When Boot from CD is checked in customized VM creation - Disk source should be Blank\n2092052 - Virtualization should be omitted in Calatog breadcrumbs\n2092071 - Getting started card in Virtualization overview can not be hidden. \n2092079 - Error message stays even when problematic field is dismissed\n2092158 - PrometheusRule kubevirt-hyperconverged-prometheus-rule is not getting reconciled by HCO\n2092228 - Ensure Machine Type for new VMs is 8.6\n2092230 - [RFE] Add indication/mark to deprecated template\n2092306 - VM is stucking with WaitingForVolumeBinding if creating via \"Boot from CD\"\n2092337 - os is empty in VM details page\n2092359 - [e2e] data-test-id includes all pvc name\n2092654 - [RFE] No obvious way to delete the ssh key from the VM\n2092662 - No url example for rhel and windows template\n2092663 - no hyperlink for URL example in disk source \"url\"\n2092664 - no hyperlink to the cdi uploadproxy URL\n2092781 - Details card should be removed for non admins. \n2092783 - Top consumers' card should be removed for non admins. \n2092787 - Operators links should be removed from Getting started card\n2092789 - \"Learn more about Operators\" link should lead to the Red Hat documentation\n2092951 - ?Edit BootSource? action should have more explicit information when disabled\n2093282 - Remove links to 'all-namespaces/' for non-privileged user\n2093691 - Creation flow drawer left padding is broken\n2093713 - Required fields in creation flow should be highlighted if empty\n2093715 - Optional parameters section in creation flow is missing bottom padding\n2093716 - CPU|Memory modal button should say \"Restore template settings?\n2093772 - Add a service in environment it reminds a pending change in boot order\n2093773 - Console crashed if adding a service without serial number\n2093866 - Cannot create vm from the template `vm-template-example`\n2093867 - OS for template 'vm-template-example' should matching the version of the image\n2094202 - Cloud-init username field should have hint\n2094207 - Cloud-init password field should have auto-generate option\n2094208 - SSH key input is missing validation\n2094217 - YAML view should reflect shanges in SSH form\n2094222 - \"?\" icon should be placed after red asterisk in required fields\n2094323 - Workload profile should be editable in template details page\n2094405 - adding resource on enviornment isnt showing on disks list when vm is running\n2094440 - Utilization pie charts figures are not based on current data\n2094451 - PVC selection in VM creation flow does not work for non-priv user\n2094453 - CD Source selection in VM creation flow is missing Upload option\n2094465 - Typo in Source tooltip\n2094471 - Node selector modal for non-privileged user\n2094481 - Tolerations modal for non-privileged user\n2094486 - Add affinity rule modal\n2094491 - Affinity rules modal button\n2094495 - Descheduler modal has same text in two lines\n2094646 - [e2e] Elements on scheduling tab are missing proper data-test-id\n2094665 - Dedicated Resources modal for non-privileged user\n2094678 - Secrets and ConfigMaps can't be added to Windows VM\n2094727 - Creation flow should have VM info in header row\n2094807 - hardware devices dropdown has group title even with no devices in cluster\n2094813 - Cloudinit password is seen in wizard\n2094848 - Details card on Overview page - 'View details' link is missing\n2095125 - OS is empty in the clone modal\n2095129 - \"undefined\" appears in rootdisk line in clone modal\n2095224 - affinity modal for non-privileged users\n2095529 - VM migration cancelation in kebab action should have shorter name\n2095530 - Column sizes in VM list view\n2095532 - Node column in VM list view is visible to non-privileged user\n2095537 - Utilization card information should display pie charts as current data and sparkline charts as overtime\n2095570 - Details tab of VM should not have Node info for non-privileged user\n2095573 - Disks created as environment or scripts should have proper label\n2095953 - VNC console controls layout\n2095955 - VNC console tabs\n2096166 - Template \"vm-template-example\" is binding with namespace \"default\"\n2096206 - Inconsistent capitalization in Template Actions\n2096208 - Templates in the catalog list is not sorted\n2096263 - Incorrectly displaying units for Disks size or Memory field in various places\n2096333 - virtualization overview, related operators title is not aligned\n2096492 - Cannot create vm from a cloned template if its boot source is edited\n2096502 - \"Restore template settings\" should be removed from template CPU editor\n2096510 - VM can be created without any disk\n2096511 - Template shows \"no Boot Source\" and label \"Source available\" at the same time\n2096620 - in templates list, edit boot reference kebab action opens a modal with different title\n2096781 - Remove boot source provider while edit boot source reference\n2096801 - vnc thumbnail in virtual machine overview should be active on page load\n2096845 - Windows template's scripts tab is crashed\n2097328 - virtctl guestfs shouldn't required uid = 0\n2097370 - missing titles for optional parameters in wizard customization page\n2097465 - Count is not updating for 'prometheusrule' component when metrics kubevirt_hco_out_of_band_modifications_count executed\n2097586 - AccessMode should stay on ReadWriteOnce while editing a disk with storage class HPP\n2098134 - \"Workload profile\" column is not showing completely in template list\n2098135 - Workload is not showing correct in catalog after change the template's workload\n2098282 - Javascript error when changing boot source of custom template to be an uploaded file\n2099443 - No \"Quick create virtualmachine\" button for template 'vm-template-example'\n2099533 - ConsoleQuickStart for HCO CR's VM is missing\n2099535 - The cdi-uploadproxy certificate url should be opened in a new tab\n2099539 - No storage option for upload while editing a disk\n2099566 - Cloudinit should be replaced by cloud-init in all places\n2099608 - \"DynamicB\" shows in vm-example disk size\n2099633 - Doc links needs to be updated\n2099639 - Remove user line from the ssh command section\n2099802 - Details card link shouldn't be hard-coded\n2100054 - Windows VM with WSL2 guest fails to migrate\n2100284 - Virtualization overview is crashed\n2100415 - HCO is taking too much time for reconciling kubevirt-plugin deployment\n2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS\n2101164 - [dark mode] Number of alerts in Alerts card not visible enough in dark mode\n2101192 - AccessMode should stay on ReadWriteOnce while editing a disk with storage class HPP\n2101430 - Using CLOUD_USER_PASSWORD in Templates parameters breaks VM review page\n2101454 - Cannot add PVC boot source to template in 'Edit Boot Source Reference' view as a non-priv user\n2101485 - Cloudinit should be replaced by cloud-init in all places\n2101628 - non-priv user cannot load dataSource while edit template's rootdisk\n2101954 - [4.11]Smart clone and csi clone leaves tmp unbound PVC and ObjectTransfer\n2102076 - Using CLOUD_USER_PASSWORD in Templates parameters breaks VM review page\n2102116 - [e2e] elements on Template Scheduling tab are missing proper data-test-id\n2102117 - [e2e] elements on VM Scripts tab are missing proper data-test-id\n2102122 - non-priv user cannot load dataSource while edit template's rootdisk\n2102124 - Cannot add PVC boot source to template in 'Edit Boot Source Reference' view as a non-priv user\n2102125 - vm clone modal is displaying DV size instead of PVC size\n2102127 - Cannot add NIC to VM template as non-priv user\n2102129 - All templates are labeling \"source available\" in template list page\n2102131 - The number of hardware devices is not correct in vm overview tab\n2102135 - [dark mode] Number of alerts in Alerts card not visible enough in dark mode\n2102143 - vm clone modal is displaying DV size instead of PVC size\n2102256 - Add button moved to right\n2102448 - VM disk is deleted by uncheck \"Delete disks (1x)\" on delete modal\n2102543 - Add button moved to right\n2102544 - VM disk is deleted by uncheck \"Delete disks (1x)\" on delete modal\n2102545 - VM filter has two \"Other\" checkboxes which are triggered together\n2104617 - Storage status report \"OpenShift Data Foundation is not available\" even the operator is installed\n2106175 - All pages are crashed after visit Virtualization -> Overview\n2106258 - All pages are crashed after visit Virtualization -> Overview\n2110178 - [Docs] Text repetition in Virtual Disk Hot plug instructions\n2111359 - kubevirt plugin console is crashed after creating a vm with 2 nics\n2111562 - kubevirt plugin console crashed after visit vmi page\n2117872 - CVE-2022-1798 kubeVirt: Arbitrary file read on the host from KubeVirt VMs\n\n5. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-25032\nhttps://access.redhat.com/security/cve/CVE-2019-5827\nhttps://access.redhat.com/security/cve/CVE-2019-13750\nhttps://access.redhat.com/security/cve/CVE-2019-13751\nhttps://access.redhat.com/security/cve/CVE-2019-17594\nhttps://access.redhat.com/security/cve/CVE-2019-17595\nhttps://access.redhat.com/security/cve/CVE-2019-18218\nhttps://access.redhat.com/security/cve/CVE-2019-19603\nhttps://access.redhat.com/security/cve/CVE-2019-20838\nhttps://access.redhat.com/security/cve/CVE-2020-13435\nhttps://access.redhat.com/security/cve/CVE-2020-14155\nhttps://access.redhat.com/security/cve/CVE-2020-17541\nhttps://access.redhat.com/security/cve/CVE-2020-24370\nhttps://access.redhat.com/security/cve/CVE-2020-35492\nhttps://access.redhat.com/security/cve/CVE-2021-3580\nhttps://access.redhat.com/security/cve/CVE-2021-3634\nhttps://access.redhat.com/security/cve/CVE-2021-3737\nhttps://access.redhat.com/security/cve/CVE-2021-4115\nhttps://access.redhat.com/security/cve/CVE-2021-4189\nhttps://access.redhat.com/security/cve/CVE-2021-20231\nhttps://access.redhat.com/security/cve/CVE-2021-20232\nhttps://access.redhat.com/security/cve/CVE-2021-23177\nhttps://access.redhat.com/security/cve/CVE-2021-25219\nhttps://access.redhat.com/security/cve/CVE-2021-31535\nhttps://access.redhat.com/security/cve/CVE-2021-31566\nhttps://access.redhat.com/security/cve/CVE-2021-36084\nhttps://access.redhat.com/security/cve/CVE-2021-36085\nhttps://access.redhat.com/security/cve/CVE-2021-36086\nhttps://access.redhat.com/security/cve/CVE-2021-36087\nhttps://access.redhat.com/security/cve/CVE-2021-38185\nhttps://access.redhat.com/security/cve/CVE-2021-38561\nhttps://access.redhat.com/security/cve/CVE-2021-40528\nhttps://access.redhat.com/security/cve/CVE-2021-43527\nhttps://access.redhat.com/security/cve/CVE-2021-44716\nhttps://access.redhat.com/security/cve/CVE-2021-44717\nhttps://access.redhat.com/security/cve/CVE-2022-0778\nhttps://access.redhat.com/security/cve/CVE-2022-1271\nhttps://access.redhat.com/security/cve/CVE-2022-1292\nhttps://access.redhat.com/security/cve/CVE-2022-1621\nhttps://access.redhat.com/security/cve/CVE-2022-1629\nhttps://access.redhat.com/security/cve/CVE-2022-1798\nhttps://access.redhat.com/security/cve/CVE-2022-2068\nhttps://access.redhat.com/security/cve/CVE-2022-2097\nhttps://access.redhat.com/security/cve/CVE-2022-21698\nhttps://access.redhat.com/security/cve/CVE-2022-22576\nhttps://access.redhat.com/security/cve/CVE-2022-23772\nhttps://access.redhat.com/security/cve/CVE-2022-23773\nhttps://access.redhat.com/security/cve/CVE-2022-23806\nhttps://access.redhat.com/security/cve/CVE-2022-24407\nhttps://access.redhat.com/security/cve/CVE-2022-24675\nhttps://access.redhat.com/security/cve/CVE-2022-24921\nhttps://access.redhat.com/security/cve/CVE-2022-25313\nhttps://access.redhat.com/security/cve/CVE-2022-25314\nhttps://access.redhat.com/security/cve/CVE-2022-27191\nhttps://access.redhat.com/security/cve/CVE-2022-27774\nhttps://access.redhat.com/security/cve/CVE-2022-27776\nhttps://access.redhat.com/security/cve/CVE-2022-27782\nhttps://access.redhat.com/security/cve/CVE-2022-28327\nhttps://access.redhat.com/security/cve/CVE-2022-29824\nhttps://access.redhat.com/security/updates/classification/#important\n\n6. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBYyJ8IdzjgjWX9erEAQh2Dw/+M+tknCYULLILonF1TEVyD12Yyo+Pabbt\na4YQUX2aFlmhOOaVBRXwDMrIPJi/Mi52+Kh05PE4/q2RndH/UbY/SfmtV70UTgiO\ngb7r+w86fTMHc8h60G9rYfmuVvqgL1HWg7HImJHxtB5DHFcbwtUmB3/nJ5O2oiGn\noQdcr2KWA0UjVqv13VffBdkYRbTREJdF/7+2eJDKvFjNiKZYxNw4tBYxgEGcasU/\nW61U+E8VU9uRHwtQOUvsOM8ga+3m/qyV8eov4BjmoEUUJYJeqI7hDhn8/GBtMJgb\nzKL1F3+PgEVyxoZsIKT3YJTLKJd1JLdIEe05fInlcoDSnNU3WZQhNKDZzusW4Mkg\nB9mwZAhicKGlUNzpt3qp9clq9j/fH1IjS7PetaEBcpr9xeH8VglDLHmNqoMoNmO8\nS74c2v3tl6/VnqsYo+jrLLQHbfwrbxCNi1ROpSzr2CD5E9wcyrRS9IBacZKEMYe1\n810o/o7T64G9+7xy/5IkPb4lEb3fKC5huBhwZKTjJJQtl6ojLSLXECFR8+1wQTTi\nLD0EAKjZhVtaMDJVRCo4jL2e2cdfGHJkeIYRzcqo6EmuFzVZYUrPsqyXzERQ6+r9\nayXDJs6y+3BakK/TZi8H3jkE23POT8OqEOR34bGrcaW1BvAEG0GejXh4qEJmzhlg\nJpmb+NWHfF0VHM\n-----END PGP SIGNATURE-----\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n", sources: [ { db: "NVD", id: "CVE-2022-1629", }, { db: "JVNDB", id: "JVNDB-2022-010778", }, { db: "VULHUB", id: "VHN-419742", }, { db: "PACKETSTORM", id: "167985", }, { db: "PACKETSTORM", id: "168036", }, { db: "PACKETSTORM", id: "167956", }, { db: "PACKETSTORM", id: "167778", }, { db: "PACKETSTORM", id: "167845", }, { db: "PACKETSTORM", id: "167644", }, { db: "PACKETSTORM", id: "168392", }, ], trust: 2.34, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-1629", trust: 4, }, { db: "PACKETSTORM", id: "167985", trust: 0.8, }, { db: "PACKETSTORM", id: "167778", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2022-010778", trust: 0.8, }, { db: "PACKETSTORM", id: "167853", trust: 0.7, }, { db: "PACKETSTORM", id: "167666", trust: 0.7, }, { db: "CS-HELP", id: "SB2022071342", trust: 0.6, }, { db: "CS-HELP", id: "SB2022072631", trust: 0.6, }, { db: "CS-HELP", id: "SB2022052017", trust: 0.6, }, { db: "CS-HELP", id: "SB2022070109", trust: 0.6, }, { db: "CS-HELP", id: "SB2022070642", trust: 0.6, }, { db: "CS-HELP", id: "SB2022063027", trust: 0.6, }, { db: "CS-HELP", id: "SB2022072127", trust: 0.6, }, { db: "CS-HELP", id: "SB2022072010", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.5300", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.4601", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3226", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3821", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3977", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3554", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3873", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3644", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202205-2825", trust: 0.6, }, { db: "PACKETSTORM", id: "167644", trust: 0.2, }, { db: "PACKETSTORM", id: "167845", trust: 0.2, }, { db: "PACKETSTORM", id: "167838", trust: 0.1, }, { db: "PACKETSTORM", id: "167984", trust: 0.1, }, { db: "VULHUB", id: "VHN-419742", trust: 0.1, }, { db: "PACKETSTORM", id: "168036", trust: 0.1, }, { db: "PACKETSTORM", id: "167956", trust: 0.1, }, { db: "PACKETSTORM", id: "168392", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-419742", }, { db: "JVNDB", id: "JVNDB-2022-010778", }, { db: "PACKETSTORM", id: "167985", }, { db: "PACKETSTORM", id: "168036", }, { db: "PACKETSTORM", id: "167956", }, { db: "PACKETSTORM", id: "167778", }, { db: "PACKETSTORM", id: "167845", }, { db: "PACKETSTORM", id: "167644", }, { db: "PACKETSTORM", id: "168392", }, { db: "CNNVD", id: "CNNVD-202205-2825", }, { db: "NVD", id: "CVE-2022-1629", }, ], }, id: "VAR-202205-0881", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-419742", }, ], trust: 0.01, }, last_update_date: "2024-11-29T21:27:25.754000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "trailing backslash may cause reading past end of line Apple Apple Security Updates", trust: 0.8, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/", }, { title: "Vim Buffer error vulnerability fix", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=193121", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-010778", }, { db: "CNNVD", id: "CNNVD-202205-2825", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-126", trust: 1.1, }, { problemtype: "CWE-125", trust: 1, }, { problemtype: "Out-of-bounds read (CWE-125) [NVD evaluation ]", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-419742", }, { db: "JVNDB", id: "JVNDB-2022-010778", }, { db: "NVD", id: "CVE-2022-1629", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://support.apple.com/kb/ht213488", }, { trust: 1.7, url: "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee", }, { trust: 1.7, url: "http://seclists.org/fulldisclosure/2022/oct/28", }, { trust: 1.7, url: "http://seclists.org/fulldisclosure/2022/oct/41", }, { trust: 1.7, url: "https://security.gentoo.org/glsa/202208-32", }, { trust: 1.7, url: "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd", }, { trust: 1.6, url: "https://security.gentoo.org/glsa/202305-16", }, { trust: 1.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1629", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/hip7kg7tvs5yf3qreay2gogut3yubzai/", }, { trust: 0.7, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/hip7kg7tvs5yf3qreay2gogut3yubzai/", }, { trust: 0.7, url: "https://access.redhat.com/security/cve/cve-2022-1621", }, { trust: 0.7, url: "https://access.redhat.com/security/team/contact/", }, { trust: 0.7, url: "https://access.redhat.com/security/cve/cve-2022-1629", }, { trust: 0.7, url: "https://bugzilla.redhat.com/):", }, { trust: 0.7, url: "https://listman.redhat.com/mailman/listinfo/rhsa-announce", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2022-25314", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2022-27782", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2022-27776", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2022-22576", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2022-25313", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2022-27774", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2021-40528", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2022-29824", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2022-1271", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022072631", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3977", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022072127", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022070642", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb20220720108", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022071342", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/167666/red-hat-security-advisory-2022-5242-01.html", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/167853/red-hat-security-advisory-2022-5531-01.html", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022063027", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.5300", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022070109", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/vim-out-of-bounds-memory-reading-via-find-next-quote-38391", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3554", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3873", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022052017", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/167985/red-hat-security-advisory-2022-5909-01.html", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-1629/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3226", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3644", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/167778/red-hat-security-advisory-2022-5673-01.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3821", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.4601", }, { trust: 0.5, url: "https://access.redhat.com/security/updates/classification/#moderate", }, { trust: 0.4, url: "https://access.redhat.com/security/cve/cve-2021-38561", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1621", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2022-27774", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22576", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2021-40528", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2022-25314", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2022-25313", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1271", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-36084", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-28327", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-36085", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2019-20838", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-4189", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-24407", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-3634", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2019-17595", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2018-25032", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2019-17594", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-3737", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2020-14155", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2019-20838", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-36087", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2019-17594", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2019-17595", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2019-18218", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-36086", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2019-18218", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14155", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2018-25032", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-24675", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-0778", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-27782", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-27776", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-38561", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-5827", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-5827", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-3580", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-24921", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-24370", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-13435", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-27191", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19603", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-23772", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-13750", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-23177", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-13751", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-19603", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-21698", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-13750", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-20231", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-13751", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-20232", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-25219", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-31566", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-23806", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-24370", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-23773", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-13435", }, { trust: 0.2, url: "https://issues.jboss.org/):", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-28915", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-28915", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-27666", }, { trust: 0.2, url: "https://access.redhat.com/security/updates/classification/#important", }, { trust: 0.2, url: "https://access.redhat.com/articles/11258", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-34169", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-21540", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-21540", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-29824", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-21541", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.8/logging/cluster-logging-release-notes.html", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-21541", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.8/logging/cluster-logging-upgrading.html", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:5909", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:5068", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-20095", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-29162", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-42771", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1706", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-18874", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-28493", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-18874", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1729", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:5070", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24903", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-28493", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-36084", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-29526", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-29362", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-29361", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1365", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2018-1000858", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-41617", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-29363", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-1000858", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-36085", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-13050", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-29363", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-13050", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-29362", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-29361", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:5840", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-41103", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:4991", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-26945", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-30321", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3737", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3634", }, { trust: 0.1, url: "https://access.redhat.com/containers", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4189", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-43565", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-26945", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-43565", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:5673", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-30322", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-30323", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-41103", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-27666", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-26691", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:5556", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-26691", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html", }, { trust: 0.1, url: "https://access.redhat.com/security/team/key/", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:5319", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:6526", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-2097", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-38185", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-2068", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-35492", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-35492", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1798", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-44717", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-44716", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1292", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-17541", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-43527", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-4115", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-31535", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-17541", }, ], sources: [ { db: "VULHUB", id: "VHN-419742", }, { db: "JVNDB", id: "JVNDB-2022-010778", }, { db: "PACKETSTORM", id: "167985", }, { db: "PACKETSTORM", id: "168036", }, { db: "PACKETSTORM", id: "167956", }, { db: "PACKETSTORM", id: "167778", }, { db: "PACKETSTORM", id: "167845", }, { db: "PACKETSTORM", id: "167644", }, { db: "PACKETSTORM", id: "168392", }, { db: "CNNVD", id: "CNNVD-202205-2825", }, { db: "NVD", id: "CVE-2022-1629", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-419742", }, { db: "JVNDB", id: "JVNDB-2022-010778", }, { db: "PACKETSTORM", id: "167985", }, { db: "PACKETSTORM", id: "168036", }, { db: "PACKETSTORM", id: "167956", }, { db: "PACKETSTORM", id: "167778", }, { db: "PACKETSTORM", id: "167845", }, { db: "PACKETSTORM", id: "167644", }, { db: "PACKETSTORM", id: "168392", }, { db: "CNNVD", id: "CNNVD-202205-2825", }, { db: "NVD", id: "CVE-2022-1629", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-05-10T00:00:00", db: "VULHUB", id: "VHN-419742", }, { date: "2023-08-17T00:00:00", db: "JVNDB", id: "JVNDB-2022-010778", }, { date: "2022-08-05T14:52:04", db: "PACKETSTORM", id: "167985", }, { date: "2022-08-10T15:54:58", db: "PACKETSTORM", id: "168036", }, { date: "2022-08-04T14:49:41", db: "PACKETSTORM", id: "167956", }, { date: "2022-07-21T20:26:52", db: "PACKETSTORM", id: "167778", }, { date: "2022-07-27T17:28:30", db: "PACKETSTORM", id: "167845", }, { date: "2022-07-01T14:56:38", db: "PACKETSTORM", id: "167644", }, { date: "2022-09-15T14:20:18", db: "PACKETSTORM", id: "168392", }, { date: "2022-05-10T00:00:00", db: "CNNVD", id: "CNNVD-202205-2825", }, { date: "2022-05-10T14:15:08.530000", db: "NVD", id: "CVE-2022-1629", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-10-31T00:00:00", db: "VULHUB", id: "VHN-419742", }, { date: "2023-08-17T04:19:00", db: "JVNDB", id: "JVNDB-2022-010778", }, { date: "2023-05-04T00:00:00", db: "CNNVD", id: "CNNVD-202205-2825", }, { date: "2024-11-21T06:41:07.860000", db: "NVD", id: "CVE-2022-1629", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202205-2825", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "vim/vim Out-of-bounds read vulnerability in", sources: [ { db: "JVNDB", id: "JVNDB-2022-010778", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-202205-2825", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.