{"affected":[{"ecosystem_specific":{"binaries":[{"gvim":"9.0.1234-17.12.1","vim":"9.0.1234-17.12.1","vim-data":"9.0.1234-17.12.1","vim-data-common":"9.0.1234-17.12.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 9","name":"vim","purl":"pkg:rpm/suse/vim&distro=SUSE%20OpenStack%20Cloud%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.0.1234-17.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gvim":"9.0.1234-17.12.1","vim":"9.0.1234-17.12.1","vim-data":"9.0.1234-17.12.1","vim-data-common":"9.0.1234-17.12.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud Crowbar 9","name":"vim","purl":"pkg:rpm/suse/vim&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.0.1234-17.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gvim":"9.0.1234-17.12.1","vim":"9.0.1234-17.12.1","vim-data":"9.0.1234-17.12.1","vim-data-common":"9.0.1234-17.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"vim","purl":"pkg:rpm/suse/vim&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.0.1234-17.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gvim":"9.0.1234-17.12.1","vim":"9.0.1234-17.12.1","vim-data":"9.0.1234-17.12.1","vim-data-common":"9.0.1234-17.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"vim","purl":"pkg:rpm/suse/vim&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.0.1234-17.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gvim":"9.0.1234-17.12.1","vim":"9.0.1234-17.12.1","vim-data":"9.0.1234-17.12.1","vim-data-common":"9.0.1234-17.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4-LTSS","name":"vim","purl":"pkg:rpm/suse/vim&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.0.1234-17.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gvim":"9.0.1234-17.12.1","vim":"9.0.1234-17.12.1","vim-data":"9.0.1234-17.12.1","vim-data-common":"9.0.1234-17.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"vim","purl":"pkg:rpm/suse/vim&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.0.1234-17.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gvim":"9.0.1234-17.12.1","vim":"9.0.1234-17.12.1","vim-data":"9.0.1234-17.12.1","vim-data-common":"9.0.1234-17.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"vim","purl":"pkg:rpm/suse/vim&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.0.1234-17.12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for vim fixes the following issues:\n\n- Updated to version 9.0.1234:\n  - CVE-2023-0433: Fixed an out of bounds memory access that could\n    cause a crash (bsc#1207396).\n  - CVE-2023-0288: Fixed an out of bounds memory access that could\n    cause a crash (bsc#1207162).\n  - CVE-2023-0054: Fixed an out of bounds memory write that could\n    cause a crash or memory corruption (bsc#1206868).\n  - CVE-2023-0051: Fixed an out of bounds memory access that could\n    cause a crash (bsc#1206867).\n  - CVE-2023-0049: Fixed an out of bounds memory access that could\n    cause a crash (bsc#1206866).\n  - CVE-2022-3491: Fixed an out of bounds memory access that could\n    cause a crash (bsc#1206028).\n  - CVE-2022-3520: Fixed an out of bounds memory access that could\n    cause a crash (bsc#1206071).\n  - CVE-2022-3591: Fixed a use-after-free issue that could cause\n    memory corruption or undefined behavior (bsc#1206072).\n  - CVE-2022-4292: Fixed a use-after-free issue that could cause\n    memory corruption or undefined behavior (bsc#1206075).\n  - CVE-2022-4293: Fixed a floating point exception that could cause\n    a crash (bsc#1206077).\n  - CVE-2022-4141: Fixed an out of bounds memory write that could\n    cause a crash or memory corruption (bsc#1205797).\n  - CVE-2022-3705: Fixed an use-after-free issue that could cause\n    a crash or memory corruption (bsc#1204779).\n","id":"SUSE-SU-2023:0209-1","modified":"2023-01-30T16:25:05Z","published":"2023-01-30T16:25:05Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20230209-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206028"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206077"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206866"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206868"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207396"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3491"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3520"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3591"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3705"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0054"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0433"}],"related":["CVE-2022-3491","CVE-2022-3520","CVE-2022-3591","CVE-2022-3705","CVE-2022-4141","CVE-2022-4292","CVE-2022-4293","CVE-2023-0049","CVE-2023-0051","CVE-2023-0054","CVE-2023-0288","CVE-2023-0433"],"summary":"Security update for vim","upstream":["CVE-2022-3491","CVE-2022-3520","CVE-2022-3591","CVE-2022-3705","CVE-2022-4141","CVE-2022-4292","CVE-2022-4293","CVE-2023-0049","CVE-2023-0051","CVE-2023-0054","CVE-2023-0288","CVE-2023-0433"]}