SUSE: 2022:4619-1 moderate: vim | LinuxSecurity.com

   SUSE Security Update: Security update for vim
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:4619-1
Rating:             moderate
References:         #1070955 #1173256 #1174564 #1176549 #1182324 
                    #1190533 #1190570 #1191770 #1191893 #1192167 
                    #1192478 #1192481 #1192902 #1192903 #1192904 
                    #1193294 #1193298 #1193466 #1193905 #1194093 
                    #1194216 #1194217 #1194388 #1194556 #1194872 
                    #1194885 #1195004 #1195066 #1195126 #1195202 
                    #1195203 #1195332 #1195354 #1195356 #1196361 
                    #1198596 #1198748 #1199331 #1199333 #1199334 
                    #1199651 #1199655 #1199693 #1199745 #1199747 
                    #1199936 #1200010 #1200011 #1200012 #1200270 
                    #1200697 #1200698 #1200700 #1200701 #1200732 
                    #1200884 #1200902 #1200903 #1200904 #1201132 
                    #1201133 #1201134 #1201135 #1201136 #1201150 
                    #1201151 #1201152 #1201153 #1201154 #1201155 
                    #1201249 #1201356 #1201359 #1201363 #1201620 
                    #1201863 #1202046 #1202049 #1202050 #1202051 
                    #1202414 #1202420 #1202421 #1202511 #1202512 
                    #1202515 #1202552 #1202599 #1202687 #1202689 
                    #1202862 #1202962 #1203110 #1203152 #1203155 
                    #1203194 #1203272 #1203508 #1203509 #1203796 
                    #1203797 #1203799 #1203820 #1203924 #1204779 
                    
Cross-References:   CVE-2009-0316 CVE-2016-1248 CVE-2017-17087
                    CVE-2017-5953 CVE-2017-6349 CVE-2017-6350
                    CVE-2021-3778 CVE-2021-3796 CVE-2021-3872
                    CVE-2021-3875 CVE-2021-3903 CVE-2021-3927
                    CVE-2021-3928 CVE-2021-3968 CVE-2021-3973
                    CVE-2021-3974 CVE-2021-3984 CVE-2021-4019
                    CVE-2021-4069 CVE-2021-4136 CVE-2021-4166
                    CVE-2021-4192 CVE-2021-4193 CVE-2021-46059
                    CVE-2022-0128 CVE-2022-0213 CVE-2022-0261
                    CVE-2022-0318 CVE-2022-0319 CVE-2022-0351
                    CVE-2022-0359 CVE-2022-0361 CVE-2022-0392
                    CVE-2022-0407 CVE-2022-0413 CVE-2022-0696
                    CVE-2022-1381 CVE-2022-1420 CVE-2022-1616
                    CVE-2022-1619 CVE-2022-1620 CVE-2022-1720
                    CVE-2022-1733 CVE-2022-1735 CVE-2022-1771
                    CVE-2022-1785 CVE-2022-1796 CVE-2022-1851
                    CVE-2022-1897 CVE-2022-1898 CVE-2022-1927
                    CVE-2022-1968 CVE-2022-2124 CVE-2022-2125
                    CVE-2022-2126 CVE-2022-2129 CVE-2022-2175
                    CVE-2022-2182 CVE-2022-2183 CVE-2022-2206
                    CVE-2022-2207 CVE-2022-2208 CVE-2022-2210
                    CVE-2022-2231 CVE-2022-2257 CVE-2022-2264
                    CVE-2022-2284 CVE-2022-2285 CVE-2022-2286
                    CVE-2022-2287 CVE-2022-2304 CVE-2022-2343
                    CVE-2022-2344 CVE-2022-2345 CVE-2022-2522
                    CVE-2022-2571 CVE-2022-2580 CVE-2022-2581
                    CVE-2022-2598 CVE-2022-2816 CVE-2022-2817
                    CVE-2022-2819 CVE-2022-2845 CVE-2022-2849
                    CVE-2022-2862 CVE-2022-2874 CVE-2022-2889
                    CVE-2022-2923 CVE-2022-2946 CVE-2022-2980
                    CVE-2022-2982 CVE-2022-3016 CVE-2022-3037
                    CVE-2022-3099 CVE-2022-3134 CVE-2022-3153
                    CVE-2022-3234 CVE-2022-3235 CVE-2022-3278
                    CVE-2022-3296 CVE-2022-3297 CVE-2022-3324
                    CVE-2022-3352 CVE-2022-3705
CVSS scores:
                    CVE-2016-1248 (NVD) : 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2017-17087 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2017-17087 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2017-5953 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2017-5953 (SUSE): 8.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2017-6349 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2017-6350 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-3778 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3778 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2021-3796 (NVD) : 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
                    CVE-2021-3796 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2021-3872 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3872 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3875 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-3875 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3903 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-3903 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
                    CVE-2021-3927 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3927 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
                    CVE-2021-3928 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-3928 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
                    CVE-2021-3968 (NVD) : 8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3973 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3974 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3974 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-3984 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3984 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-4019 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-4019 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-4069 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-4069 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
                    CVE-2021-4136 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-4136 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-4166 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
                    CVE-2021-4166 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
                    CVE-2021-4192 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-4192 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2021-4193 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2021-4193 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2021-46059 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-0128 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0128 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2022-0213 (NVD) : 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
                    CVE-2022-0213 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-0261 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0261 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-0318 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-0318 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-0319 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2022-0319 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2022-0351 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-0351 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-0359 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0359 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
                    CVE-2022-0361 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0361 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
                    CVE-2022-0392 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0392 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
                    CVE-2022-0407 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0407 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0413 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0413 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0696 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-0696 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-1381 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1381 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-1420 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-1420 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-1616 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1616 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-1619 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1619 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-1620 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-1620 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-1720 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1720 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-1733 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1733 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2022-1735 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1735 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-1771 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-1771 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-1785 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1785 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-1796 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1796 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-1851 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1851 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-1897 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1897 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-1898 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1898 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-1927 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1927 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
                    CVE-2022-1968 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1968 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
                    CVE-2022-2124 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2124 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2125 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2125 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2126 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2126 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2129 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2129 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2175 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2175 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2182 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2182 (SUSE): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
                    CVE-2022-2183 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2183 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
                    CVE-2022-2206 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2206 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
                    CVE-2022-2207 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2207 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2208 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2208 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2210 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2210 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-2231 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2231 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2257 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2257 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2264 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2264 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2284 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2284 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2285 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2285 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
                    CVE-2022-2286 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2286 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2287 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
                    CVE-2022-2287 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2304 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2304 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-2343 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2343 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2344 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2344 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2345 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2345 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2522 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2522 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2571 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2571 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-2580 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2580 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-2581 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2581 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2022-2598 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2598 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2816 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2816 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2817 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2817 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2819 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2819 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2845 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2845 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2849 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2849 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2862 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2862 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
                    CVE-2022-2874 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2874 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2889 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2889 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2923 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2923 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2946 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2946 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-2980 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-2980 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-2982 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2982 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-3016 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3016 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-3037 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3037 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-3099 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3099 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-3134 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3134 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-3153 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-3153 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-3234 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3235 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3235 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-3278 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-3278 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-3296 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3296 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2022-3297 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3297 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-3324 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3324 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3352 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3352 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2022-3705 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3705 (SUSE): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Affected Products:
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise Server 12-SP3-BCL
                    SUSE Linux Enterprise Server 12-SP4-LTSS
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server for SAP 12-SP4
                    SUSE OpenStack Cloud 9
                    SUSE OpenStack Cloud Crowbar 9
______________________________________________________________________________

   An update that solves 104 vulnerabilities and has one
   errata is now available.

Description:

   This update for vim fixes the following issues:

   Updated to version 9.0.0814:

     * Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to
       Stack-based Buffer Overflow
     * Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer
       Overflow prior to 9.0.0483.
     * Fixing bsc#1203509 VUL-1: CVE-2022-3235: vim: Use After Free in GitHub
       prior to 9.0.0490.
     * Fixing bsc#1203820 VUL-0: CVE-2022-3324: vim: Stack-based Buffer
       Overflow in prior to 9.0.0598.
     * Fixing bsc#1204779 VUL-0: CVE-2022-3705: vim: use after free in
       function qf_update_buffer of the file quickfix.c
     * Fixing bsc#1203152 VUL-1: CVE-2022-2982: vim: use after free in
       qf_fill_buffer()
     * Fixing bsc#1203796 VUL-1: CVE-2022-3296: vim: stack out of bounds read
       in ex_finally() in ex_eval.c
     * Fixing bsc#1203797 VUL-1: CVE-2022-3297: vim: use-after-free in
       process_next_cpt_value() at insexpand.c
     * Fixing bsc#1203110 VUL-1: CVE-2022-3099: vim: Use After Free in
       ex_docmd.c
     * Fixing bsc#1203194 VUL-1: CVE-2022-3134: vim: use after free in
       do_tag()
     * Fixing bsc#1203272 VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference
       in GitHub repository vim/vim prior to 9.0.0404.
     * Fixing bsc#1203799 VUL-1: CVE-2022-3278: vim: NULL pointer dereference
       in eval_next_non_blank() in eval.c
     * Fixing bsc#1203924 VUL-1: CVE-2022-3352: vim: vim: use after free
     * Fixing bsc#1203155 VUL-1: CVE-2022-2980: vim: null pointer dereference
       in do_mouse()
     * Fixing bsc#1202962 VUL-1: CVE-2022-3037: vim: Use After Free in vim
       prior to 9.0.0321
     * Fixing bsc#1200884 Vim: Error on startup
     * Fixing bsc#1200902 VUL-0: CVE-2022-2183: vim: Out-of-bounds Read
       through get_lisp_indent() Mon 13:32
     * Fixing bsc#1200903 VUL-0: CVE-2022-2182: vim: Heap-based Buffer
       Overflow through parse_cmd_address() Tue 08:37
     * Fixing bsc#1200904 VUL-0: CVE-2022-2175: vim: Buffer Over-read through
       cmdline_insert_reg() Tue 08:37
     * Fixing bsc#1201249 VUL-0: CVE-2022-2304: vim: stack buffer overflow in
       spell_dump_compl()
     * Fixing bsc#1201356 VUL-1: CVE-2022-2343: vim: Heap-based Buffer
       Overflow in GitHub repository vim prior to 9.0.0044
     * Fixing bsc#1201359 VUL-1: CVE-2022-2344: vim: Another Heap-based
       Buffer Overflow vim prior to 9.0.0045
     * Fixing bsc#1201363 VUL-1: CVE-2022-2345: vim: Use After Free in GitHub
       repository vim prior to 9.0.0046.
     * Fixing bsc#1201620 vim: SLE-15-SP4-Full-x86_64-GM-Media1 and
       vim-plugin-tlib-1.27-bp154.2.18.noarch issue
     * Fixing bsc#1202414 VUL-1: CVE-2022-2819: vim: Heap-based Buffer
       Overflow in compile_lock_unlock()
     * Fixing bsc#1202552 VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference
       in generate_loadvar()
     * Fixing bsc#1200270 VUL-1: CVE-2022-1968: vim: use after free in
       utf_ptr2char
     * Fixing bsc#1200697 VUL-1: CVE-2022-2124: vim: out of bounds read in
       current_quote()
     * Fixing bsc#1200698 VUL-1: CVE-2022-2125: vim: out of bounds read in
       get_lisp_indent()
     * Fixing bsc#1200700 VUL-1: CVE-2022-2126: vim: out of bounds read in
       suggest_trie_walk()
     * Fixing bsc#1200701 VUL-1: CVE-2022-2129: vim: out of bounds write in
       vim_regsub_both()
     * Fixing bsc#1200732 VUL-1: CVE-2022-1720: vim: out of bounds read in
       grab_file_name()
     * Fixing bsc#1201132 VUL-1: CVE-2022-2264: vim: out of bounds read in
       inc()
     * Fixing bsc#1201133 VUL-1: CVE-2022-2284: vim: out of bounds read in
       utfc_ptr2len()
     * Fixing bsc#1201134 VUL-1: CVE-2022-2285: vim: negative size passed to
       memmove() due to integer overflow
     * Fixing bsc#1201135 VUL-1: CVE-2022-2286: vim: out of bounds read in
       ins_bytes()
     * Fixing bsc#1201136 VUL-1: CVE-2022-2287: vim: out of bounds read in
       suggest_trie_walk()
     * Fixing bsc#1201150 VUL-1: CVE-2022-2231: vim: null pointer dereference
       skipwhite()
     * Fixing bsc#1201151 VUL-1: CVE-2022-2210: vim: out of bounds read in
       ml_append_int()
     * Fixing bsc#1201152 VUL-1: CVE-2022-2208: vim: null pointer dereference
       in diff_check()
     * Fixing bsc#1201153 VUL-1: CVE-2022-2207: vim: out of bounds read in
       ins_bs()
     * Fixing bsc#1201154 VUL-1: CVE-2022-2257: vim: out of bounds read in
       msg_outtrans_special()
     * Fixing bsc#1201155 VUL-1: CVE-2022-2206: vim: out of bounds read in
       msg_outtrans_attr()
     * Fixing bsc#1201863 VUL-1: CVE-2022-2522: vim: out of bounds read via
       nested autocommand
     * Fixing bsc#1202046 VUL-1: CVE-2022-2571: vim: Heap-based Buffer
       Overflow related to ins_comp_get_next_word_or_line()
     * Fixing bsc#1202049 VUL-1: CVE-2022-2580: vim: Heap-based Buffer
       Overflow related to eval_string()
     * Fixing bsc#1202050 VUL-1: CVE-2022-2581: vim: Out-of-bounds Read
       related to cstrchr()
     * Fixing bsc#1202051 VUL-1: CVE-2022-2598: vim: Undefined Behavior for
       Input to API related to diff_mark_adjust_tp() and ex_diffgetput()
     * Fixing bsc#1202420 VUL-1: CVE-2022-2817: vim: Use After Free in
       f_assert_fails()
     * Fixing bsc#1202421 VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in
       check_vim9_unlet()
     * Fixing bsc#1202511 VUL-1: CVE-2022-2862: vim: use-after-free in
       compile_nested_function()
     * Fixing bsc#1202512 VUL-1: CVE-2022-2849: vim: Invalid memory access
       related to mb_ptr2len()
     * Fixing bsc#1202515 VUL-1: CVE-2022-2845: vim: Buffer Over-read related
       to display_dollar()
     * Fixing bsc#1202599 VUL-1: CVE-2022-2889: vim: use-after-free in
       find_var_also_in_script() in evalvars.c
     * Fixing bsc#1202687 VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference
       in GitHub repository vim/vim prior to 9.0.0240
     * Fixing bsc#1202689 VUL-1: CVE-2022-2946: vim: use after free in
       function vim_vsnprintf_typval
     * Fixing bsc#1202862 VUL-1: CVE-2022-3016: vim: Use After Free in vim
       prior to 9.0.0285 Mon 12:00
     * Fixing bsc#1191770 VUL-0: CVE-2021-3875: vim: heap-based buffer
       overflow
     * Fixing bsc#1192167 VUL-0: CVE-2021-3903: vim: heap-based buffer
       overflow
     * Fixing bsc#1192902 VUL-0: CVE-2021-3968: vim: vim is vulnerable to
       Heap-based Buffer Overflow
     * Fixing bsc#1192903 VUL-0: CVE-2021-3973: vim: vim is vulnerable to
       Heap-based Buffer Overflow
     * Fixing bsc#1192904 VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use
       After Free
     * Fixing bsc#1193466 VUL-1: CVE-2021-4069: vim: use-after-free in
       ex_open() in src/ex_docmd.c
     * Fixing bsc#1193905 VUL-0: CVE-2021-4136: vim: vim is vulnerable to
       Heap-based Buffer Overflow
     * Fixing bsc#1194093 VUL-1: CVE-2021-4166: vim: vim is vulnerable to
       Out-of-bounds Read
     * Fixing bsc#1194216 VUL-1: CVE-2021-4193: vim: vulnerable to
       Out-of-bounds Read
     * Fixing bsc#1194217 VUL-0: CVE-2021-4192: vim: vulnerable to Use After
       Free
     * Fixing bsc#1194872 VUL-0: CVE-2022-0261: vim: Heap-based Buffer
       Overflow in vim prior to 8.2.
     * Fixing bsc#1194885 VUL-0: CVE-2022-0213: vim: vim is vulnerable to
       Heap-based Buffer Overflow
     * Fixing bsc#1195004 VUL-0: CVE-2022-0318: vim: Heap-based Buffer
       Overflow in vim prior to 8.2.
     * Fixing bsc#1195203 VUL-0: CVE-2022-0359: vim: heap-based buffer
       overflow in init_ccline() in ex_getln.c
     * Fixing bsc#1195354 VUL-0: CVE-2022-0407: vim: Heap-based Buffer
       Overflow in Conda vim prior to 8.2.
     * Fixing bsc#1198596 VUL-0: CVE-2022-1381: vim: global heap buffer
       overflow in skip_range
     * Fixing bsc#1199331 VUL-0: CVE-2022-1616: vim: Use after free in
       append_command
     * Fixing bsc#1199333 VUL-0: CVE-2022-1619: vim: Heap-based Buffer
       Overflow in function cmdline_erase_chars
     * Fixing bsc#1199334 VUL-0: CVE-2022-1620: vim: NULL Pointer Dereference
       in function vim_regexec_string
     * Fixing bsc#1199747 VUL-0: CVE-2022-1796: vim: Use After in
       find_pattern_in_path
     * Fixing bsc#1200010 VUL-0: CVE-2022-1897: vim: Out-of-bounds Write in
       vim
     * Fixing bsc#1200011 VUL-0: CVE-2022-1898: vim: Use After Free in vim
       prior to 8.2
     * Fixing bsc#1200012 VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim
       prior to 8.2
     * Fixing bsc#1070955 VUL-1: CVE-2017-17087: vim: Sets the group
       ownership of a .swp file to the editor's primary group, which allows
       local users to obtain sensitive information
     * Fixing bsc#1194388 VUL-1: CVE-2022-0128: vim: vim is vulnerable to
       Out-of-bounds Read
     * Fixing bsc#1195332 VUL-1: CVE-2022-0392: vim: Heap-based Buffer
       Overflow in vim prior to 8.2
     * Fixing bsc#1196361 VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference
       in vim prior to 8.2
     * Fixing bsc#1198748 VUL-1: CVE-2022-1420: vim: Out-of-range Pointer
       Offset
     * Fixing bsc#1199651 VUL-1: CVE-2022-1735: vim: heap buffer overflow
     * Fixing bsc#1199655 VUL-1: CVE-2022-1733: vim: Heap-based Buffer
       Overflow in cindent.c
     * Fixing bsc#1199693 VUL-1: CVE-2022-1771: vim: stack exhaustion in vim
       prior to 8.2.
     * Fixing bsc#1199745 VUL-1: CVE-2022-1785: vim: Out-of-bounds Write
     * Fixing bsc#1199936 VUL-1: CVE-2022-1851: vim: out of bounds read
     * Fixing bsc#1195004 - (CVE-2022-0318) VUL-0: CVE-2022-0318: vim:
       Heap-based Buffer Overflow in vim prior to 8.2.
     * Fixing bsc#1190570 CVE-2021-3796: vim: use-after-free in nv_replace()
       in normal.c
     * Fixing bsc#1191893 CVE-2021-3872: vim: heap-based buffer overflow in
       win_redr_status() drawscreen.c
     * Fixing bsc#1192481 CVE-2021-3927: vim: vim is vulnerable to Heap-based
       Buffer Overflow
     * Fixing bsc#1192478 CVE-2021-3928: vim: vim is vulnerable to
       Stack-based Buffer Overflow
     * Fixing bsc#1193294 CVE-2021-4019: vim: vim is vulnerable to Heap-based
       Buffer Overflow
     * Fixing bsc#1193298 CVE-2021-3984: vim: illegal memory access when
       C-indenting could lead to Heap Buffer Overflow
     * Fixing bsc#1190533 CVE-2021-3778: vim: Heap-based Buffer Overflow in
       regexp_nfa.c
     *  Fixing bsc#1194216 CVE-2021-4193: vim: vulnerable to Out-of-bounds
        Read
     * Fixing bsc#1194556 CVE-2021-46059: vim: A Pointer Dereference
       vulnerability exists in Vim 8.2.3883 via the vim_regexec_multi
       function at regexp.c, which causes a denial of service.
     * Fixing bsc#1195066 CVE-2022-0319: vim: Out-of-bounds Read in vim/vim
       prior to 8.2.
     * Fixing bsc#1195126 CVE-2022-0351: vim: uncontrolled recursion in
       eval7()
     * Fixing bsc#1195202 CVE-2022-0361: vim: Heap-based Buffer Overflow in
       vim prior to 8.2.
     * Fixing bsc#1195356 CVE-2022-0413: vim: use after free in src/ex_cmds.c


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud Crowbar 9:

      zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-4619=1

   - SUSE OpenStack Cloud 9:

      zypper in -t patch SUSE-OpenStack-Cloud-9-2022-4619=1

   - SUSE Linux Enterprise Server for SAP 12-SP4:

      zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-4619=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-4619=1

   - SUSE Linux Enterprise Server 12-SP4-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-4619=1

   - SUSE Linux Enterprise Server 12-SP3-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-4619=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-4619=1



Package List:

   - SUSE OpenStack Cloud Crowbar 9 (noarch):

      vim-data-9.0.0814-17.9.1
      vim-data-common-9.0.0814-17.9.1

   - SUSE OpenStack Cloud Crowbar 9 (x86_64):

      gvim-9.0.0814-17.9.1
      gvim-debuginfo-9.0.0814-17.9.1
      vim-9.0.0814-17.9.1
      vim-debuginfo-9.0.0814-17.9.1
      vim-debugsource-9.0.0814-17.9.1

   - SUSE OpenStack Cloud 9 (noarch):

      vim-data-9.0.0814-17.9.1
      vim-data-common-9.0.0814-17.9.1

   - SUSE OpenStack Cloud 9 (x86_64):

      gvim-9.0.0814-17.9.1
      gvim-debuginfo-9.0.0814-17.9.1
      vim-9.0.0814-17.9.1
      vim-debuginfo-9.0.0814-17.9.1
      vim-debugsource-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):

      gvim-9.0.0814-17.9.1
      gvim-debuginfo-9.0.0814-17.9.1
      vim-9.0.0814-17.9.1
      vim-debuginfo-9.0.0814-17.9.1
      vim-debugsource-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server for SAP 12-SP4 (noarch):

      vim-data-9.0.0814-17.9.1
      vim-data-common-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      gvim-9.0.0814-17.9.1
      gvim-debuginfo-9.0.0814-17.9.1
      vim-9.0.0814-17.9.1
      vim-debuginfo-9.0.0814-17.9.1
      vim-debugsource-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      vim-data-9.0.0814-17.9.1
      vim-data-common-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64):

      gvim-9.0.0814-17.9.1
      gvim-debuginfo-9.0.0814-17.9.1
      vim-9.0.0814-17.9.1
      vim-debuginfo-9.0.0814-17.9.1
      vim-debugsource-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server 12-SP4-LTSS (noarch):

      vim-data-9.0.0814-17.9.1
      vim-data-common-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server 12-SP3-BCL (noarch):

      vim-data-9.0.0814-17.9.1
      vim-data-common-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):

      gvim-9.0.0814-17.9.1
      gvim-debuginfo-9.0.0814-17.9.1
      vim-9.0.0814-17.9.1
      vim-debuginfo-9.0.0814-17.9.1
      vim-debugsource-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (noarch):

      vim-data-9.0.0814-17.9.1
      vim-data-common-9.0.0814-17.9.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      gvim-9.0.0814-17.9.1
      gvim-debuginfo-9.0.0814-17.9.1
      vim-9.0.0814-17.9.1
      vim-debuginfo-9.0.0814-17.9.1
      vim-debugsource-9.0.0814-17.9.1


References:

   https://www.suse.com/security/cve/CVE-2009-0316.html
   https://www.suse.com/security/cve/CVE-2016-1248.html
   https://www.suse.com/security/cve/CVE-2017-17087.html
   https://www.suse.com/security/cve/CVE-2017-5953.html
   https://www.suse.com/security/cve/CVE-2017-6349.html
   https://www.suse.com/security/cve/CVE-2017-6350.html
   https://www.suse.com/security/cve/CVE-2021-3778.html
   https://www.suse.com/security/cve/CVE-2021-3796.html
   https://www.suse.com/security/cve/CVE-2021-3872.html
   https://www.suse.com/security/cve/CVE-2021-3875.html
   https://www.suse.com/security/cve/CVE-2021-3903.html
   https://www.suse.com/security/cve/CVE-2021-3927.html
   https://www.suse.com/security/cve/CVE-2021-3928.html
   https://www.suse.com/security/cve/CVE-2021-3968.html
   https://www.suse.com/security/cve/CVE-2021-3973.html
   https://www.suse.com/security/cve/CVE-2021-3974.html
   https://www.suse.com/security/cve/CVE-2021-3984.html
   https://www.suse.com/security/cve/CVE-2021-4019.html
   https://www.suse.com/security/cve/CVE-2021-4069.html
   https://www.suse.com/security/cve/CVE-2021-4136.html
   https://www.suse.com/security/cve/CVE-2021-4166.html
   https://www.suse.com/security/cve/CVE-2021-4192.html
   https://www.suse.com/security/cve/CVE-2021-4193.html
   https://www.suse.com/security/cve/CVE-2021-46059.html
   https://www.suse.com/security/cve/CVE-2022-0128.html
   https://www.suse.com/security/cve/CVE-2022-0213.html
   https://www.suse.com/security/cve/CVE-2022-0261.html
   https://www.suse.com/security/cve/CVE-2022-0318.html
   https://www.suse.com/security/cve/CVE-2022-0319.html
   https://www.suse.com/security/cve/CVE-2022-0351.html
   https://www.suse.com/security/cve/CVE-2022-0359.html
   https://www.suse.com/security/cve/CVE-2022-0361.html
   https://www.suse.com/security/cve/CVE-2022-0392.html
   https://www.suse.com/security/cve/CVE-2022-0407.html
   https://www.suse.com/security/cve/CVE-2022-0413.html
   https://www.suse.com/security/cve/CVE-2022-0696.html
   https://www.suse.com/security/cve/CVE-2022-1381.html
   https://www.suse.com/security/cve/CVE-2022-1420.html
   https://www.suse.com/security/cve/CVE-2022-1616.html
   https://www.suse.com/security/cve/CVE-2022-1619.html
   https://www.suse.com/security/cve/CVE-2022-1620.html
   https://www.suse.com/security/cve/CVE-2022-1720.html
   https://www.suse.com/security/cve/CVE-2022-1733.html
   https://www.suse.com/security/cve/CVE-2022-1735.html
   https://www.suse.com/security/cve/CVE-2022-1771.html
   https://www.suse.com/security/cve/CVE-2022-1785.html
   https://www.suse.com/security/cve/CVE-2022-1796.html
   https://www.suse.com/security/cve/CVE-2022-1851.html
   https://www.suse.com/security/cve/CVE-2022-1897.html
   https://www.suse.com/security/cve/CVE-2022-1898.html
   https://www.suse.com/security/cve/CVE-2022-1927.html
   https://www.suse.com/security/cve/CVE-2022-1968.html
   https://www.suse.com/security/cve/CVE-2022-2124.html
   https://www.suse.com/security/cve/CVE-2022-2125.html
   https://www.suse.com/security/cve/CVE-2022-2126.html
   https://www.suse.com/security/cve/CVE-2022-2129.html
   https://www.suse.com/security/cve/CVE-2022-2175.html
   https://www.suse.com/security/cve/CVE-2022-2182.html
   https://www.suse.com/security/cve/CVE-2022-2183.html
   https://www.suse.com/security/cve/CVE-2022-2206.html
   https://www.suse.com/security/cve/CVE-2022-2207.html
   https://www.suse.com/security/cve/CVE-2022-2208.html
   https://www.suse.com/security/cve/CVE-2022-2210.html
   https://www.suse.com/security/cve/CVE-2022-2231.html
   https://www.suse.com/security/cve/CVE-2022-2257.html
   https://www.suse.com/security/cve/CVE-2022-2264.html
   https://www.suse.com/security/cve/CVE-2022-2284.html
   https://www.suse.com/security/cve/CVE-2022-2285.html
   https://www.suse.com/security/cve/CVE-2022-2286.html
   https://www.suse.com/security/cve/CVE-2022-2287.html
   https://www.suse.com/security/cve/CVE-2022-2304.html
   https://www.suse.com/security/cve/CVE-2022-2343.html
   https://www.suse.com/security/cve/CVE-2022-2344.html
   https://www.suse.com/security/cve/CVE-2022-2345.html
   https://www.suse.com/security/cve/CVE-2022-2522.html
   https://www.suse.com/security/cve/CVE-2022-2571.html
   https://www.suse.com/security/cve/CVE-2022-2580.html
   https://www.suse.com/security/cve/CVE-2022-2581.html
   https://www.suse.com/security/cve/CVE-2022-2598.html
   https://www.suse.com/security/cve/CVE-2022-2816.html
   https://www.suse.com/security/cve/CVE-2022-2817.html
   https://www.suse.com/security/cve/CVE-2022-2819.html
   https://www.suse.com/security/cve/CVE-2022-2845.html
   https://www.suse.com/security/cve/CVE-2022-2849.html
   https://www.suse.com/security/cve/CVE-2022-2862.html
   https://www.suse.com/security/cve/CVE-2022-2874.html
   https://www.suse.com/security/cve/CVE-2022-2889.html
   https://www.suse.com/security/cve/CVE-2022-2923.html
   https://www.suse.com/security/cve/CVE-2022-2946.html
   https://www.suse.com/security/cve/CVE-2022-2980.html
   https://www.suse.com/security/cve/CVE-2022-2982.html
   https://www.suse.com/security/cve/CVE-2022-3016.html
   https://www.suse.com/security/cve/CVE-2022-3037.html
   https://www.suse.com/security/cve/CVE-2022-3099.html
   https://www.suse.com/security/cve/CVE-2022-3134.html
   https://www.suse.com/security/cve/CVE-2022-3153.html
   https://www.suse.com/security/cve/CVE-2022-3234.html
   https://www.suse.com/security/cve/CVE-2022-3235.html
   https://www.suse.com/security/cve/CVE-2022-3278.html
   https://www.suse.com/security/cve/CVE-2022-3296.html
   https://www.suse.com/security/cve/CVE-2022-3297.html
   https://www.suse.com/security/cve/CVE-2022-3324.html
   https://www.suse.com/security/cve/CVE-2022-3352.html
   https://www.suse.com/security/cve/CVE-2022-3705.html
   https://bugzilla.suse.com/1070955
   https://bugzilla.suse.com/1173256
   https://bugzilla.suse.com/1174564
   https://bugzilla.suse.com/1176549
   https://bugzilla.suse.com/1182324
   https://bugzilla.suse.com/1190533
   https://bugzilla.suse.com/1190570
   https://bugzilla.suse.com/1191770
   https://bugzilla.suse.com/1191893
   https://bugzilla.suse.com/1192167
   https://bugzilla.suse.com/1192478
   https://bugzilla.suse.com/1192481
   https://bugzilla.suse.com/1192902
   https://bugzilla.suse.com/1192903
   https://bugzilla.suse.com/1192904
   https://bugzilla.suse.com/1193294
   https://bugzilla.suse.com/1193298
   https://bugzilla.suse.com/1193466
   https://bugzilla.suse.com/1193905
   https://bugzilla.suse.com/1194093
   https://bugzilla.suse.com/1194216
   https://bugzilla.suse.com/1194217
   https://bugzilla.suse.com/1194388
   https://bugzilla.suse.com/1194556
   https://bugzilla.suse.com/1194872
   https://bugzilla.suse.com/1194885
   https://bugzilla.suse.com/1195004
   https://bugzilla.suse.com/1195066
   https://bugzilla.suse.com/1195126
   https://bugzilla.suse.com/1195202
   https://bugzilla.suse.com/1195203
   https://bugzilla.suse.com/1195332
   https://bugzilla.suse.com/1195354
   https://bugzilla.suse.com/1195356
   https://bugzilla.suse.com/1196361
   https://bugzilla.suse.com/1198596
   https://bugzilla.suse.com/1198748
   https://bugzilla.suse.com/1199331
   https://bugzilla.suse.com/1199333
   https://bugzilla.suse.com/1199334
   https://bugzilla.suse.com/1199651
   https://bugzilla.suse.com/1199655
   https://bugzilla.suse.com/1199693
   https://bugzilla.suse.com/1199745
   https://bugzilla.suse.com/1199747
   https://bugzilla.suse.com/1199936
   https://bugzilla.suse.com/1200010
   https://bugzilla.suse.com/1200011
   https://bugzilla.suse.com/1200012
   https://bugzilla.suse.com/1200270
   https://bugzilla.suse.com/1200697
   https://bugzilla.suse.com/1200698
   https://bugzilla.suse.com/1200700
   https://bugzilla.suse.com/1200701
   https://bugzilla.suse.com/1200732
   https://bugzilla.suse.com/1200884
   https://bugzilla.suse.com/1200902
   https://bugzilla.suse.com/1200903
   https://bugzilla.suse.com/1200904
   https://bugzilla.suse.com/1201132
   https://bugzilla.suse.com/1201133
   https://bugzilla.suse.com/1201134
   https://bugzilla.suse.com/1201135
   https://bugzilla.suse.com/1201136
   https://bugzilla.suse.com/1201150
   https://bugzilla.suse.com/1201151
   https://bugzilla.suse.com/1201152
   https://bugzilla.suse.com/1201153
   https://bugzilla.suse.com/1201154
   https://bugzilla.suse.com/1201155
   https://bugzilla.suse.com/1201249
   https://bugzilla.suse.com/1201356
   https://bugzilla.suse.com/1201359
   https://bugzilla.suse.com/1201363
   https://bugzilla.suse.com/1201620
   https://bugzilla.suse.com/1201863
   https://bugzilla.suse.com/1202046
   https://bugzilla.suse.com/1202049
   https://bugzilla.suse.com/1202050
   https://bugzilla.suse.com/1202051
   https://bugzilla.suse.com/1202414
   https://bugzilla.suse.com/1202420
   https://bugzilla.suse.com/1202421
   https://bugzilla.suse.com/1202511
   https://bugzilla.suse.com/1202512
   https://bugzilla.suse.com/1202515
   https://bugzilla.suse.com/1202552
   https://bugzilla.suse.com/1202599
   https://bugzilla.suse.com/1202687
   https://bugzilla.suse.com/1202689
   https://bugzilla.suse.com/1202862
   https://bugzilla.suse.com/1202962
   https://bugzilla.suse.com/1203110
   https://bugzilla.suse.com/1203152
   https://bugzilla.suse.com/1203155
   https://bugzilla.suse.com/1203194
   https://bugzilla.suse.com/1203272
   https://bugzilla.suse.com/1203508
   https://bugzilla.suse.com/1203509
   https://bugzilla.suse.com/1203796
   https://bugzilla.suse.com/1203797
   https://bugzilla.suse.com/1203799
   https://bugzilla.suse.com/1203820
   https://bugzilla.suse.com/1203924
   https://bugzilla.suse.com/1204779

SUSE: 2022:4619-1 moderate: vim

December 27, 2022
An update that solves 104 vulnerabilities and has one errata is now available

Summary

This update for vim fixes the following issues: Updated to version 9.0.0814: * Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow * Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483. * Fixing bsc#1203509 VUL-1: CVE-2022-3235: vim: Use After Free in GitHub prior to 9.0.0490. * Fixing bsc#1203820 VUL-0: CVE-2022-3324: vim: Stack-based Buffer Overflow in prior to 9.0.0598. * Fixing bsc#1204779 VUL-0: CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c * Fixing bsc#1203152 VUL-1: CVE-2022-2982: vim: use after free in qf_fill_buffer() * Fixing bsc#1203796 VUL-1: CVE-2022-3296: vim: stack out of bounds read in ex_finally() in ex_eval.c * Fixing bsc#1203797 VUL-1: CVE-2022-3297: vim: use-after-free in process_next_cpt_value() at insexpand.c * Fixing bsc#1203110 VUL-1: CVE-2022-3099: vim: Use After Free in ex_docmd.c * Fixing bsc#1203194 VUL-1: CVE-2022-3134: vim: use after free in do_tag() * Fixing bsc#1203272 VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404. * Fixing bsc#1203799 VUL-1: CVE-2022-3278: vim: NULL pointer dereference in eval_next_non_blank() in eval.c * Fixing bsc#1203924 VUL-1: CVE-2022-3352: vim: vim: use after free * Fixing bsc#1203155 VUL-1: CVE-2022-2980: vim: null pointer dereference in do_mouse() * Fixing bsc#1202962 VUL-1: CVE-2022-3037: vim: Use After Free in vim prior to 9.0.0321 * Fixing bsc#1200884 Vim: Error on startup * Fixing bsc#1200902 VUL-0: CVE-2022-2183: vim: Out-of-bounds Read through get_lisp_indent() Mon 13:32 * Fixing bsc#1200903 VUL-0: CVE-2022-2182: vim: Heap-based Buffer Overflow through parse_cmd_address() Tue 08:37 * Fixing bsc#1200904 VUL-0: CVE-2022-2175: vim: Buffer Over-read through cmdline_insert_reg() Tue 08:37 * Fixing bsc#1201249 VUL-0: CVE-2022-2304: vim: stack buffer overflow in spell_dump_compl() * Fixing bsc#1201356 VUL-1: CVE-2022-2343: vim: Heap-based Buffer Overflow in GitHub repository vim prior to 9.0.0044 * Fixing bsc#1201359 VUL-1: CVE-2022-2344: vim: Another Heap-based Buffer Overflow vim prior to 9.0.0045 * Fixing bsc#1201363 VUL-1: CVE-2022-2345: vim: Use After Free in GitHub repository vim prior to 9.0.0046. * Fixing bsc#1201620 vim: SLE-15-SP4-Full-x86_64-GM-Media1 and vim-plugin-tlib-1.27-bp154.2.18.noarch issue * Fixing bsc#1202414 VUL-1: CVE-2022-2819: vim: Heap-based Buffer Overflow in compile_lock_unlock() * Fixing bsc#1202552 VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference in generate_loadvar() * Fixing bsc#1200270 VUL-1: CVE-2022-1968: vim: use after free in utf_ptr2char * Fixing bsc#1200697 VUL-1: CVE-2022-2124: vim: out of bounds read in current_quote() * Fixing bsc#1200698 VUL-1: CVE-2022-2125: vim: out of bounds read in get_lisp_indent() * Fixing bsc#1200700 VUL-1: CVE-2022-2126: vim: out of bounds read in suggest_trie_walk() * Fixing bsc#1200701 VUL-1: CVE-2022-2129: vim: out of bounds write in vim_regsub_both() * Fixing bsc#1200732 VUL-1: CVE-2022-1720: vim: out of bounds read in grab_file_name() * Fixing bsc#1201132 VUL-1: CVE-2022-2264: vim: out of bounds read in inc() * Fixing bsc#1201133 VUL-1: CVE-2022-2284: vim: out of bounds read in utfc_ptr2len() * Fixing bsc#1201134 VUL-1: CVE-2022-2285: vim: negative size passed to memmove() due to integer overflow * Fixing bsc#1201135 VUL-1: CVE-2022-2286: vim: out of bounds read in ins_bytes() * Fixing bsc#1201136 VUL-1: CVE-2022-2287: vim: out of bounds read in suggest_trie_walk() * Fixing bsc#1201150 VUL-1: CVE-2022-2231: vim: null pointer dereference skipwhite() * Fixing bsc#1201151 VUL-1: CVE-2022-2210: vim: out of bounds read in ml_append_int() * Fixing bsc#1201152 VUL-1: CVE-2022-2208: vim: null pointer dereference in diff_check() * Fixing bsc#1201153 VUL-1: CVE-2022-2207: vim: out of bounds read in ins_bs() * Fixing bsc#1201154 VUL-1: CVE-2022-2257: vim: out of bounds read in msg_outtrans_special() * Fixing bsc#1201155 VUL-1: CVE-2022-2206: vim: out of bounds read in msg_outtrans_attr() * Fixing bsc#1201863 VUL-1: CVE-2022-2522: vim: out of bounds read via nested autocommand * Fixing bsc#1202046 VUL-1: CVE-2022-2571: vim: Heap-based Buffer Overflow related to ins_comp_get_next_word_or_line() * Fixing bsc#1202049 VUL-1: CVE-2022-2580: vim: Heap-based Buffer Overflow related to eval_string() * Fixing bsc#1202050 VUL-1: CVE-2022-2581: vim: Out-of-bounds Read related to cstrchr() * Fixing bsc#1202051 VUL-1: CVE-2022-2598: vim: Undefined Behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput() * Fixing bsc#1202420 VUL-1: CVE-2022-2817: vim: Use After Free in f_assert_fails() * Fixing bsc#1202421 VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in check_vim9_unlet() * Fixing bsc#1202511 VUL-1: CVE-2022-2862: vim: use-after-free in compile_nested_function() * Fixing bsc#1202512 VUL-1: CVE-2022-2849: vim: Invalid memory access related to mb_ptr2len() * Fixing bsc#1202515 VUL-1: CVE-2022-2845: vim: Buffer Over-read related to display_dollar() * Fixing bsc#1202599 VUL-1: CVE-2022-2889: vim: use-after-free in find_var_also_in_script() in evalvars.c * Fixing bsc#1202687 VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240 * Fixing bsc#1202689 VUL-1: CVE-2022-2946: vim: use after free in function vim_vsnprintf_typval * Fixing bsc#1202862 VUL-1: CVE-2022-3016: vim: Use After Free in vim prior to 9.0.0285 Mon 12:00 * Fixing bsc#1191770 VUL-0: CVE-2021-3875: vim: heap-based buffer overflow * Fixing bsc#1192167 VUL-0: CVE-2021-3903: vim: heap-based buffer overflow * Fixing bsc#1192902 VUL-0: CVE-2021-3968: vim: vim is vulnerable to Heap-based Buffer Overflow * Fixing bsc#1192903 VUL-0: CVE-2021-3973: vim: vim is vulnerable to Heap-based Buffer Overflow * Fixing bsc#1192904 VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use After Free * Fixing bsc#1193466 VUL-1: CVE-2021-4069: vim: use-after-free in ex_open() in src/ex_docmd.c * Fixing bsc#1193905 VUL-0: CVE-2021-4136: vim: vim is vulnerable to Heap-based Buffer Overflow * Fixing bsc#1194093 VUL-1: CVE-2021-4166: vim: vim is vulnerable to Out-of-bounds Read * Fixing bsc#1194216 VUL-1: CVE-2021-4193: vim: vulnerable to Out-of-bounds Read * Fixing bsc#1194217 VUL-0: CVE-2021-4192: vim: vulnerable to Use After Free * Fixing bsc#1194872 VUL-0: CVE-2022-0261: vim: Heap-based Buffer Overflow in vim prior to 8.2. * Fixing bsc#1194885 VUL-0: CVE-2022-0213: vim: vim is vulnerable to Heap-based Buffer Overflow * Fixing bsc#1195004 VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2. * Fixing bsc#1195203 VUL-0: CVE-2022-0359: vim: heap-based buffer overflow in init_ccline() in ex_getln.c * Fixing bsc#1195354 VUL-0: CVE-2022-0407: vim: Heap-based Buffer Overflow in Conda vim prior to 8.2. * Fixing bsc#1198596 VUL-0: CVE-2022-1381: vim: global heap buffer overflow in skip_range * Fixing bsc#1199331 VUL-0: CVE-2022-1616: vim: Use after free in append_command * Fixing bsc#1199333 VUL-0: CVE-2022-1619: vim: Heap-based Buffer Overflow in function cmdline_erase_chars * Fixing bsc#1199334 VUL-0: CVE-2022-1620: vim: NULL Pointer Dereference in function vim_regexec_string * Fixing bsc#1199747 VUL-0: CVE-2022-1796: vim: Use After in find_pattern_in_path * Fixing bsc#1200010 VUL-0: CVE-2022-1897: vim: Out-of-bounds Write in vim * Fixing bsc#1200011 VUL-0: CVE-2022-1898: vim: Use After Free in vim prior to 8.2 * Fixing bsc#1200012 VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim prior to 8.2 * Fixing bsc#1070955 VUL-1: CVE-2017-17087: vim: Sets the group ownership of a .swp file to the editor's primary group, which allows local users to obtain sensitive information * Fixing bsc#1194388 VUL-1: CVE-2022-0128: vim: vim is vulnerable to Out-of-bounds Read * Fixing bsc#1195332 VUL-1: CVE-2022-0392: vim: Heap-based Buffer Overflow in vim prior to 8.2 * Fixing bsc#1196361 VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference in vim prior to 8.2 * Fixing bsc#1198748 VUL-1: CVE-2022-1420: vim: Out-of-range Pointer Offset * Fixing bsc#1199651 VUL-1: CVE-2022-1735: vim: heap buffer overflow * Fixing bsc#1199655 VUL-1: CVE-2022-1733: vim: Heap-based Buffer Overflow in cindent.c * Fixing bsc#1199693 VUL-1: CVE-2022-1771: vim: stack exhaustion in vim prior to 8.2. * Fixing bsc#1199745 VUL-1: CVE-2022-1785: vim: Out-of-bounds Write * Fixing bsc#1199936 VUL-1: CVE-2022-1851: vim: out of bounds read * Fixing bsc#1195004 - (CVE-2022-0318) VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2. * Fixing bsc#1190570 CVE-2021-3796: vim: use-after-free in nv_replace() in normal.c * Fixing bsc#1191893 CVE-2021-3872: vim: heap-based buffer overflow in win_redr_status() drawscreen.c * Fixing bsc#1192481 CVE-2021-3927: vim: vim is vulnerable to Heap-based Buffer Overflow * Fixing bsc#1192478 CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow * Fixing bsc#1193294 CVE-2021-4019: vim: vim is vulnerable to Heap-based Buffer Overflow * Fixing bsc#1193298 CVE-2021-3984: vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow * Fixing bsc#1190533 CVE-2021-3778: vim: Heap-based Buffer Overflow in regexp_nfa.c * Fixing bsc#1194216 CVE-2021-4193: vim: vulnerable to Out-of-bounds Read * Fixing bsc#1194556 CVE-2021-46059: vim: A Pointer Dereference vulnerability exists in Vim 8.2.3883 via the vim_regexec_multi function at regexp.c, which causes a denial of service. * Fixing bsc#1195066 CVE-2022-0319: vim: Out-of-bounds Read in vim/vim prior to 8.2. * Fixing bsc#1195126 CVE-2022-0351: vim: uncontrolled recursion in eval7() * Fixing bsc#1195202 CVE-2022-0361: vim: Heap-based Buffer Overflow in vim prior to 8.2. * Fixing bsc#1195356 CVE-2022-0413: vim: use after free in src/ex_cmds.c Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud Crowbar 9: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-4619=1 - SUSE OpenStack Cloud 9: zypper in -t patch SUSE-OpenStack-Cloud-9-2022-4619=1 - SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-4619=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-4619=1 - SUSE Linux Enterprise Server 12-SP4-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-4619=1 - SUSE Linux Enterprise Server 12-SP3-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-4619=1 - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-4619=1 Package List: - SUSE OpenStack Cloud Crowbar 9 (noarch): vim-data-9.0.0814-17.9.1 vim-data-common-9.0.0814-17.9.1 - SUSE OpenStack Cloud Crowbar 9 (x86_64): gvim-9.0.0814-17.9.1 gvim-debuginfo-9.0.0814-17.9.1 vim-9.0.0814-17.9.1 vim-debuginfo-9.0.0814-17.9.1 vim-debugsource-9.0.0814-17.9.1 - SUSE OpenStack Cloud 9 (noarch): vim-data-9.0.0814-17.9.1 vim-data-common-9.0.0814-17.9.1 - SUSE OpenStack Cloud 9 (x86_64): gvim-9.0.0814-17.9.1 gvim-debuginfo-9.0.0814-17.9.1 vim-9.0.0814-17.9.1 vim-debuginfo-9.0.0814-17.9.1 vim-debugsource-9.0.0814-17.9.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64): gvim-9.0.0814-17.9.1 gvim-debuginfo-9.0.0814-17.9.1 vim-9.0.0814-17.9.1 vim-debuginfo-9.0.0814-17.9.1 vim-debugsource-9.0.0814-17.9.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (noarch): vim-data-9.0.0814-17.9.1 vim-data-common-9.0.0814-17.9.1 - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): gvim-9.0.0814-17.9.1 gvim-debuginfo-9.0.0814-17.9.1 vim-9.0.0814-17.9.1 vim-debuginfo-9.0.0814-17.9.1 vim-debugsource-9.0.0814-17.9.1 - SUSE Linux Enterprise Server 12-SP5 (noarch): vim-data-9.0.0814-17.9.1 vim-data-common-9.0.0814-17.9.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64): gvim-9.0.0814-17.9.1 gvim-debuginfo-9.0.0814-17.9.1 vim-9.0.0814-17.9.1 vim-debuginfo-9.0.0814-17.9.1 vim-debugsource-9.0.0814-17.9.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (noarch): vim-data-9.0.0814-17.9.1 vim-data-common-9.0.0814-17.9.1 - SUSE Linux Enterprise Server 12-SP3-BCL (noarch): vim-data-9.0.0814-17.9.1 vim-data-common-9.0.0814-17.9.1 - SUSE Linux Enterprise Server 12-SP3-BCL (x86_64): gvim-9.0.0814-17.9.1 gvim-debuginfo-9.0.0814-17.9.1 vim-9.0.0814-17.9.1 vim-debuginfo-9.0.0814-17.9.1 vim-debugsource-9.0.0814-17.9.1 - SUSE Linux Enterprise Server 12-SP2-BCL (noarch): vim-data-9.0.0814-17.9.1 vim-data-common-9.0.0814-17.9.1 - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): gvim-9.0.0814-17.9.1 gvim-debuginfo-9.0.0814-17.9.1 vim-9.0.0814-17.9.1 vim-debuginfo-9.0.0814-17.9.1 vim-debugsource-9.0.0814-17.9.1

References

#1070955 #1173256 #1174564 #1176549 #1182324

#1190533 #1190570 #1191770 #1191893 #1192167

#1192478 #1192481 #1192902 #1192903 #1192904

#1193294 #1193298 #1193466 #1193905 #1194093

#1194216 #1194217 #1194388 #1194556 #1194872

#1194885 #1195004 #1195066 #1195126 #1195202

#1195203 #1195332 #1195354 #1195356 #1196361

#1198596 #1198748 #1199331 #1199333 #1199334

#1199651 #1199655 #1199693 #1199745 #1199747

#1199936 #1200010 #1200011 #1200012 #1200270

#1200697 #1200698 #1200700 #1200701 #1200732

#1200884 #1200902 #1200903 #1200904 #1201132

#1201133 #1201134 #1201135 #1201136 #1201150

#1201151 #1201152 #1201153 #1201154 #1201155

#1201249 #1201356 #1201359 #1201363 #1201620

#1201863 #1202046 #1202049 #1202050 #1202051

#1202414 #1202420 #1202421 #1202511 #1202512

#1202515 #1202552 #1202599 #1202687 #1202689

#1202862 #1202962 #1203110 #1203152 #1203155

#1203194 #1203272 #1203508 #1203509 #1203796

#1203797 #1203799 #1203820 #1203924 #1204779

Cross- CVE-2009-0316 CVE-2016-1248 CVE-2017-17087

CVE-2017-5953 CVE-2017-6349 CVE-2017-6350

CVE-2021-3778 CVE-2021-3796 CVE-2021-3872

CVE-2021-3875 CVE-2021-3903 CVE-2021-3927

CVE-2021-3928 CVE-2021-3968 CVE-2021-3973

CVE-2021-3974 CVE-2021-3984 CVE-2021-4019

CVE-2021-4069 CVE-2021-4136 CVE-2021-4166

CVE-2021-4192 CVE-2021-4193 CVE-2021-46059

CVE-2022-0128 CVE-2022-0213 CVE-2022-0261

CVE-2022-0318 CVE-2022-0319 CVE-2022-0351

CVE-2022-0359 CVE-2022-0361 CVE-2022-0392

CVE-2022-0407 CVE-2022-0413 CVE-2022-0696

CVE-2022-1381 CVE-2022-1420 CVE-2022-1616

CVE-2022-1619 CVE-2022-1620 CVE-2022-1720

CVE-2022-1733 CVE-2022-1735 CVE-2022-1771

CVE-2022-1785 CVE-2022-1796 CVE-2022-1851

CVE-2022-1897 CVE-2022-1898 CVE-2022-1927

CVE-2022-1968 CVE-2022-2124 CVE-2022-2125

CVE-2022-2126 CVE-2022-2129 CVE-2022-2175

CVE-2022-2182 CVE-2022-2183 CVE-2022-2206

CVE-2022-2207 CVE-2022-2208 CVE-2022-2210

CVE-2022-2231 CVE-2022-2257 CVE-2022-2264

CVE-2022-2284 CVE-2022-2285 CVE-2022-2286

CVE-2022-2287 CVE-2022-2304 CVE-2022-2343

CVE-2022-2344 CVE-2022-2345 CVE-2022-2522

CVE-2022-2571 CVE-2022-2580 CVE-2022-2581

CVE-2022-2598 CVE-2022-2816 CVE-2022-2817

CVE-2022-2819 CVE-2022-2845 CVE-2022-2849

CVE-2022-2862 CVE-2022-2874 CVE-2022-2889

CVE-2022-2923 CVE-2022-2946 CVE-2022-2980

CVE-2022-2982 CVE-2022-3016 CVE-2022-3037

CVE-2022-3099 CVE-2022-3134 CVE-2022-3153

CVE-2022-3234 CVE-2022-3235 CVE-2022-3278

CVE-2022-3296 CVE-2022-3297 CVE-2022-3324

CVE-2022-3352 CVE-2022-3705

CVSS scores:

CVE-2016-1248 (NVD) : 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2017-17087 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2017-17087 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2017-5953 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2017-5953 (SUSE): 8.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2017-6349 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2017-6350 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2021-3778 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-3778 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2021-3796 (NVD) : 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H

CVE-2021-3796 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2021-3872 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-3872 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-3875 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2021-3875 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVE-2021-3903 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-3903 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L

CVE-2021-3927 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-3927 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L

CVE-2021-3928 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-3928 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L

CVE-2021-3968 (NVD) : 8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVE-2021-3973 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-3974 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-3974 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-3984 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-3984 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2021-4019 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-4019 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2021-4069 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-4069 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2021-4136 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-4136 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-4166 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

CVE-2021-4166 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L

CVE-2021-4192 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-4192 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2021-4193 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVE-2021-4193 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2021-46059 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-0128 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-0128 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVE-2022-0213 (NVD) : 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

CVE-2022-0213 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-0261 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-0261 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-0318 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-0318 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-0319 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVE-2022-0319 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVE-2022-0351 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-0351 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-0359 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-0359 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

CVE-2022-0361 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-0361 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

CVE-2022-0392 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-0392 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

CVE-2022-0407 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-0407 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-0413 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-0413 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-0696 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-0696 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-1381 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1381 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-1420 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-1420 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-1616 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1616 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-1619 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1619 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-1620 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-1620 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-1720 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1720 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-1733 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-1733 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVE-2022-1735 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1735 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-1771 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-1771 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-1785 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-1785 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-1796 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1796 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-1851 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1851 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-1897 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1897 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-1898 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1898 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-1927 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1927 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L

CVE-2022-1968 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1968 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

CVE-2022-2124 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2124 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2125 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2125 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2126 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2126 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2129 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2129 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2175 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2175 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2182 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2182 (SUSE): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L

CVE-2022-2183 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2183 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L

CVE-2022-2206 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2206 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L

CVE-2022-2207 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2207 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2208 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2208 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2210 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2210 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-2231 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2231 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2257 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2257 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2264 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2264 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2284 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2284 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2285 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2285 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

CVE-2022-2286 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2286 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2287 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

CVE-2022-2287 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2304 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2304 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-2343 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2343 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2344 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2344 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2345 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2345 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2522 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2522 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2571 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2571 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-2580 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2580 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-2581 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2581 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVE-2022-2598 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2598 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2816 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2816 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2817 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2817 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2819 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2819 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2845 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2845 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2849 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2849 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2862 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2862 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

CVE-2022-2874 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2874 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2889 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2889 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2923 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2923 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2946 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2946 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-2980 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-2980 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-2982 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2982 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-3016 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3016 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-3037 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3037 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-3099 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3099 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-3134 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3134 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-3153 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-3153 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-3234 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3235 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3235 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-3278 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-3278 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-3296 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3296 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVE-2022-3297 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3297 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2022-3324 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3324 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3352 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3352 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

CVE-2022-3705 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-3705 (SUSE): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Affected Products:

SUSE Linux Enterprise Server 12-SP2-BCL

SUSE Linux Enterprise Server 12-SP3-BCL

SUSE Linux Enterprise Server 12-SP4-LTSS

SUSE Linux Enterprise Server 12-SP5

SUSE Linux Enterprise Server for SAP 12-SP4

SUSE OpenStack Cloud 9

SUSE OpenStack Cloud Crowbar 9

https://www.suse.com/security/cve/CVE-2009-0316.html

https://www.suse.com/security/cve/CVE-2016-1248.html

https://www.suse.com/security/cve/CVE-2017-17087.html

https://www.suse.com/security/cve/CVE-2017-5953.html

https://www.suse.com/security/cve/CVE-2017-6349.html

https://www.suse.com/security/cve/CVE-2017-6350.html

https://www.suse.com/security/cve/CVE-2021-3778.html

https://www.suse.com/security/cve/CVE-2021-3796.html

https://www.suse.com/security/cve/CVE-2021-3872.html

https://www.suse.com/security/cve/CVE-2021-3875.html

https://www.suse.com/security/cve/CVE-2021-3903.html

https://www.suse.com/security/cve/CVE-2021-3927.html

https://www.suse.com/security/cve/CVE-2021-3928.html

https://www.suse.com/security/cve/CVE-2021-3968.html

https://www.suse.com/security/cve/CVE-2021-3973.html

https://www.suse.com/security/cve/CVE-2021-3974.html

https://www.suse.com/security/cve/CVE-2021-3984.html

https://www.suse.com/security/cve/CVE-2021-4019.html

https://www.suse.com/security/cve/CVE-2021-4069.html

https://www.suse.com/security/cve/CVE-2021-4136.html

https://www.suse.com/security/cve/CVE-2021-4166.html

https://www.suse.com/security/cve/CVE-2021-4192.html

https://www.suse.com/security/cve/CVE-2021-4193.html

https://www.suse.com/security/cve/CVE-2021-46059.html

https://www.suse.com/security/cve/CVE-2022-0128.html

https://www.suse.com/security/cve/CVE-2022-0213.html

https://www.suse.com/security/cve/CVE-2022-0261.html

https://www.suse.com/security/cve/CVE-2022-0318.html

https://www.suse.com/security/cve/CVE-2022-0319.html

https://www.suse.com/security/cve/CVE-2022-0351.html

https://www.suse.com/security/cve/CVE-2022-0359.html

https://www.suse.com/security/cve/CVE-2022-0361.html

https://www.suse.com/security/cve/CVE-2022-0392.html

https://www.suse.com/security/cve/CVE-2022-0407.html

https://www.suse.com/security/cve/CVE-2022-0413.html

https://www.suse.com/security/cve/CVE-2022-0696.html

https://www.suse.com/security/cve/CVE-2022-1381.html

https://www.suse.com/security/cve/CVE-2022-1420.html

https://www.suse.com/security/cve/CVE-2022-1616.html

https://www.suse.com/security/cve/CVE-2022-1619.html

https://www.suse.com/security/cve/CVE-2022-1620.html

https://www.suse.com/security/cve/CVE-2022-1720.html

https://www.suse.com/security/cve/CVE-2022-1733.html

https://www.suse.com/security/cve/CVE-2022-1735.html

https://www.suse.com/security/cve/CVE-2022-1771.html

https://www.suse.com/security/cve/CVE-2022-1785.html

https://www.suse.com/security/cve/CVE-2022-1796.html

https://www.suse.com/security/cve/CVE-2022-1851.html

https://www.suse.com/security/cve/CVE-2022-1897.html

https://www.suse.com/security/cve/CVE-2022-1898.html

https://www.suse.com/security/cve/CVE-2022-1927.html

https://www.suse.com/security/cve/CVE-2022-1968.html

https://www.suse.com/security/cve/CVE-2022-2124.html

https://www.suse.com/security/cve/CVE-2022-2125.html

https://www.suse.com/security/cve/CVE-2022-2126.html

https://www.suse.com/security/cve/CVE-2022-2129.html

https://www.suse.com/security/cve/CVE-2022-2175.html

https://www.suse.com/security/cve/CVE-2022-2182.html

https://www.suse.com/security/cve/CVE-2022-2183.html

https://www.suse.com/security/cve/CVE-2022-2206.html

https://www.suse.com/security/cve/CVE-2022-2207.html

https://www.suse.com/security/cve/CVE-2022-2208.html

https://www.suse.com/security/cve/CVE-2022-2210.html

https://www.suse.com/security/cve/CVE-2022-2231.html

https://www.suse.com/security/cve/CVE-2022-2257.html

https://www.suse.com/security/cve/CVE-2022-2264.html

https://www.suse.com/security/cve/CVE-2022-2284.html

https://www.suse.com/security/cve/CVE-2022-2285.html

https://www.suse.com/security/cve/CVE-2022-2286.html

https://www.suse.com/security/cve/CVE-2022-2287.html

https://www.suse.com/security/cve/CVE-2022-2304.html

https://www.suse.com/security/cve/CVE-2022-2343.html

https://www.suse.com/security/cve/CVE-2022-2344.html

https://www.suse.com/security/cve/CVE-2022-2345.html

https://www.suse.com/security/cve/CVE-2022-2522.html

https://www.suse.com/security/cve/CVE-2022-2571.html

https://www.suse.com/security/cve/CVE-2022-2580.html

https://www.suse.com/security/cve/CVE-2022-2581.html

https://www.suse.com/security/cve/CVE-2022-2598.html

https://www.suse.com/security/cve/CVE-2022-2816.html

https://www.suse.com/security/cve/CVE-2022-2817.html

https://www.suse.com/security/cve/CVE-2022-2819.html

https://www.suse.com/security/cve/CVE-2022-2845.html

https://www.suse.com/security/cve/CVE-2022-2849.html

https://www.suse.com/security/cve/CVE-2022-2862.html

https://www.suse.com/security/cve/CVE-2022-2874.html

https://www.suse.com/security/cve/CVE-2022-2889.html

https://www.suse.com/security/cve/CVE-2022-2923.html

https://www.suse.com/security/cve/CVE-2022-2946.html

https://www.suse.com/security/cve/CVE-2022-2980.html

https://www.suse.com/security/cve/CVE-2022-2982.html

https://www.suse.com/security/cve/CVE-2022-3016.html

https://www.suse.com/security/cve/CVE-2022-3037.html

https://www.suse.com/security/cve/CVE-2022-3099.html

https://www.suse.com/security/cve/CVE-2022-3134.html

https://www.suse.com/security/cve/CVE-2022-3153.html

https://www.suse.com/security/cve/CVE-2022-3234.html

https://www.suse.com/security/cve/CVE-2022-3235.html

https://www.suse.com/security/cve/CVE-2022-3278.html

https://www.suse.com/security/cve/CVE-2022-3296.html

https://www.suse.com/security/cve/CVE-2022-3297.html

https://www.suse.com/security/cve/CVE-2022-3324.html

https://www.suse.com/security/cve/CVE-2022-3352.html

https://www.suse.com/security/cve/CVE-2022-3705.html

https://bugzilla.suse.com/1070955

https://bugzilla.suse.com/1173256

https://bugzilla.suse.com/1174564

https://bugzilla.suse.com/1176549

https://bugzilla.suse.com/1182324

https://bugzilla.suse.com/1190533

https://bugzilla.suse.com/1190570

https://bugzilla.suse.com/1191770

https://bugzilla.suse.com/1191893

https://bugzilla.suse.com/1192167

https://bugzilla.suse.com/1192478

https://bugzilla.suse.com/1192481

https://bugzilla.suse.com/1192902

https://bugzilla.suse.com/1192903

https://bugzilla.suse.com/1192904

https://bugzilla.suse.com/1193294

https://bugzilla.suse.com/1193298

https://bugzilla.suse.com/1193466

https://bugzilla.suse.com/1193905

https://bugzilla.suse.com/1194093

https://bugzilla.suse.com/1194216

https://bugzilla.suse.com/1194217

https://bugzilla.suse.com/1194388

https://bugzilla.suse.com/1194556

https://bugzilla.suse.com/1194872

https://bugzilla.suse.com/1194885

https://bugzilla.suse.com/1195004

https://bugzilla.suse.com/1195066

https://bugzilla.suse.com/1195126

https://bugzilla.suse.com/1195202

https://bugzilla.suse.com/1195203

https://bugzilla.suse.com/1195332

https://bugzilla.suse.com/1195354

https://bugzilla.suse.com/1195356

https://bugzilla.suse.com/1196361

https://bugzilla.suse.com/1198596

https://bugzilla.suse.com/1198748

https://bugzilla.suse.com/1199331

https://bugzilla.suse.com/1199333

https://bugzilla.suse.com/1199334

https://bugzilla.suse.com/1199651

https://bugzilla.suse.com/1199655

https://bugzilla.suse.com/1199693

https://bugzilla.suse.com/1199745

https://bugzilla.suse.com/1199747

https://bugzilla.suse.com/1199936

https://bugzilla.suse.com/1200010

https://bugzilla.suse.com/1200011

https://bugzilla.suse.com/1200012

https://bugzilla.suse.com/1200270

https://bugzilla.suse.com/1200697

https://bugzilla.suse.com/1200698

https://bugzilla.suse.com/1200700

https://bugzilla.suse.com/1200701

https://bugzilla.suse.com/1200732

https://bugzilla.suse.com/1200884

https://bugzilla.suse.com/1200902

https://bugzilla.suse.com/1200903

https://bugzilla.suse.com/1200904

https://bugzilla.suse.com/1201132

https://bugzilla.suse.com/1201133

https://bugzilla.suse.com/1201134

https://bugzilla.suse.com/1201135

https://bugzilla.suse.com/1201136

https://bugzilla.suse.com/1201150

https://bugzilla.suse.com/1201151

https://bugzilla.suse.com/1201152

https://bugzilla.suse.com/1201153

https://bugzilla.suse.com/1201154

https://bugzilla.suse.com/1201155

https://bugzilla.suse.com/1201249

https://bugzilla.suse.com/1201356

https://bugzilla.suse.com/1201359

https://bugzilla.suse.com/1201363

https://bugzilla.suse.com/1201620

https://bugzilla.suse.com/1201863

https://bugzilla.suse.com/1202046

https://bugzilla.suse.com/1202049

https://bugzilla.suse.com/1202050

https://bugzilla.suse.com/1202051

https://bugzilla.suse.com/1202414

https://bugzilla.suse.com/1202420

https://bugzilla.suse.com/1202421

https://bugzilla.suse.com/1202511

https://bugzilla.suse.com/1202512

https://bugzilla.suse.com/1202515

https://bugzilla.suse.com/1202552

https://bugzilla.suse.com/1202599

https://bugzilla.suse.com/1202687

https://bugzilla.suse.com/1202689

https://bugzilla.suse.com/1202862

https://bugzilla.suse.com/1202962

https://bugzilla.suse.com/1203110

https://bugzilla.suse.com/1203152

https://bugzilla.suse.com/1203155

https://bugzilla.suse.com/1203194

https://bugzilla.suse.com/1203272

https://bugzilla.suse.com/1203508

https://bugzilla.suse.com/1203509

https://bugzilla.suse.com/1203796

https://bugzilla.suse.com/1203797

https://bugzilla.suse.com/1203799

https://bugzilla.suse.com/1203820

https://bugzilla.suse.com/1203924

https://bugzilla.suse.com/1204779

Severity
Announcement ID: SUSE-SU-2022:4619-1
Rating: moderate

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.