suse-su-2024:4409-1
Vulnerability from csaf_suse
Published
2024-12-23 09:20
Modified
2024-12-23 09:20
Summary
Recommended update for vim

Notes

Title of the patch
Recommended update for vim
Description of the patch
This update for vim fixes the following issues: - CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373) - CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238) Other fixes: - Remove patch that introduced a bug caused significantly more CPU usage (bsc#1220618) - Updated to version 9.1.0836
Patchnames
SUSE-2024-4409,SUSE-SLE-SERVER-12-SP5-LTSS-2024-4409,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4409
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Recommended update for vim",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for vim fixes the following issues:\n\n- CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373)\n- CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238)\n\nOther fixes:\n\n- Remove patch that introduced a bug caused significantly more CPU usage (bsc#1220618)\n- Updated to version 9.1.0836\n \n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-4409,SUSE-SLE-SERVER-12-SP5-LTSS-2024-4409,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4409",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4409-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:4409-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244409-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:4409-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020043.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220618",
        "url": "https://bugzilla.suse.com/1220618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1229238",
        "url": "https://bugzilla.suse.com/1229238"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231373",
        "url": "https://bugzilla.suse.com/1231373"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-43374 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-43374/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-47814 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-47814/"
      }
    ],
    "title": "Recommended update for vim",
    "tracking": {
      "current_release_date": "2024-12-23T09:20:49Z",
      "generator": {
        "date": "2024-12-23T09:20:49Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:4409-1",
      "initial_release_date": "2024-12-23T09:20:49Z",
      "revision_history": [
        {
          "date": "2024-12-23T09:20:49Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gvim-9.1.0836-17.38.1.aarch64",
                "product": {
                  "name": "gvim-9.1.0836-17.38.1.aarch64",
                  "product_id": "gvim-9.1.0836-17.38.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "vim-9.1.0836-17.38.1.aarch64",
                "product": {
                  "name": "vim-9.1.0836-17.38.1.aarch64",
                  "product_id": "vim-9.1.0836-17.38.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "vim-small-9.1.0836-17.38.1.aarch64",
                "product": {
                  "name": "vim-small-9.1.0836-17.38.1.aarch64",
                  "product_id": "vim-small-9.1.0836-17.38.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gvim-9.1.0836-17.38.1.i586",
                "product": {
                  "name": "gvim-9.1.0836-17.38.1.i586",
                  "product_id": "gvim-9.1.0836-17.38.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "vim-9.1.0836-17.38.1.i586",
                "product": {
                  "name": "vim-9.1.0836-17.38.1.i586",
                  "product_id": "vim-9.1.0836-17.38.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "vim-small-9.1.0836-17.38.1.i586",
                "product": {
                  "name": "vim-small-9.1.0836-17.38.1.i586",
                  "product_id": "vim-small-9.1.0836-17.38.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "vim-data-9.1.0836-17.38.1.noarch",
                "product": {
                  "name": "vim-data-9.1.0836-17.38.1.noarch",
                  "product_id": "vim-data-9.1.0836-17.38.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "vim-data-common-9.1.0836-17.38.1.noarch",
                "product": {
                  "name": "vim-data-common-9.1.0836-17.38.1.noarch",
                  "product_id": "vim-data-common-9.1.0836-17.38.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gvim-9.1.0836-17.38.1.ppc64le",
                "product": {
                  "name": "gvim-9.1.0836-17.38.1.ppc64le",
                  "product_id": "gvim-9.1.0836-17.38.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "vim-9.1.0836-17.38.1.ppc64le",
                "product": {
                  "name": "vim-9.1.0836-17.38.1.ppc64le",
                  "product_id": "vim-9.1.0836-17.38.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "vim-small-9.1.0836-17.38.1.ppc64le",
                "product": {
                  "name": "vim-small-9.1.0836-17.38.1.ppc64le",
                  "product_id": "vim-small-9.1.0836-17.38.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gvim-9.1.0836-17.38.1.s390",
                "product": {
                  "name": "gvim-9.1.0836-17.38.1.s390",
                  "product_id": "gvim-9.1.0836-17.38.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "vim-9.1.0836-17.38.1.s390",
                "product": {
                  "name": "vim-9.1.0836-17.38.1.s390",
                  "product_id": "vim-9.1.0836-17.38.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "vim-small-9.1.0836-17.38.1.s390",
                "product": {
                  "name": "vim-small-9.1.0836-17.38.1.s390",
                  "product_id": "vim-small-9.1.0836-17.38.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gvim-9.1.0836-17.38.1.s390x",
                "product": {
                  "name": "gvim-9.1.0836-17.38.1.s390x",
                  "product_id": "gvim-9.1.0836-17.38.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "vim-9.1.0836-17.38.1.s390x",
                "product": {
                  "name": "vim-9.1.0836-17.38.1.s390x",
                  "product_id": "vim-9.1.0836-17.38.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "vim-small-9.1.0836-17.38.1.s390x",
                "product": {
                  "name": "vim-small-9.1.0836-17.38.1.s390x",
                  "product_id": "vim-small-9.1.0836-17.38.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "gvim-9.1.0836-17.38.1.x86_64",
                "product": {
                  "name": "gvim-9.1.0836-17.38.1.x86_64",
                  "product_id": "gvim-9.1.0836-17.38.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "vim-9.1.0836-17.38.1.x86_64",
                "product": {
                  "name": "vim-9.1.0836-17.38.1.x86_64",
                  "product_id": "vim-9.1.0836-17.38.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "vim-small-9.1.0836-17.38.1.x86_64",
                "product": {
                  "name": "vim-small-9.1.0836-17.38.1.x86_64",
                  "product_id": "vim-small-9.1.0836-17.38.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gvim-9.1.0836-17.38.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64"
        },
        "product_reference": "gvim-9.1.0836-17.38.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gvim-9.1.0836-17.38.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le"
        },
        "product_reference": "gvim-9.1.0836-17.38.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gvim-9.1.0836-17.38.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x"
        },
        "product_reference": "gvim-9.1.0836-17.38.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gvim-9.1.0836-17.38.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64"
        },
        "product_reference": "gvim-9.1.0836-17.38.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-9.1.0836-17.38.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64"
        },
        "product_reference": "vim-9.1.0836-17.38.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-9.1.0836-17.38.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le"
        },
        "product_reference": "vim-9.1.0836-17.38.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-9.1.0836-17.38.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x"
        },
        "product_reference": "vim-9.1.0836-17.38.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-9.1.0836-17.38.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64"
        },
        "product_reference": "vim-9.1.0836-17.38.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-data-9.1.0836-17.38.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch"
        },
        "product_reference": "vim-data-9.1.0836-17.38.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-data-common-9.1.0836-17.38.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch"
        },
        "product_reference": "vim-data-common-9.1.0836-17.38.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gvim-9.1.0836-17.38.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64"
        },
        "product_reference": "gvim-9.1.0836-17.38.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-9.1.0836-17.38.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64"
        },
        "product_reference": "vim-9.1.0836-17.38.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-data-9.1.0836-17.38.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch"
        },
        "product_reference": "vim-data-9.1.0836-17.38.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-data-common-9.1.0836-17.38.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch"
        },
        "product_reference": "vim-data-common-9.1.0836-17.38.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-43374",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-43374"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-43374",
          "url": "https://www.suse.com/security/cve/CVE-2024-43374"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1229238 for CVE-2024-43374",
          "url": "https://bugzilla.suse.com/1229238"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-12-23T09:20:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-43374"
    },
    {
      "cve": "CVE-2024-47814",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-47814"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Vim is an open source, command line text editor. A use-after-free was found in Vim \u003c 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-47814",
          "url": "https://www.suse.com/security/cve/CVE-2024-47814"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1231373 for CVE-2024-47814",
          "url": "https://bugzilla.suse.com/1231373"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-12-23T09:20:49Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-47814"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…