SUSE Container Update Advisory: suse/sle-micro/5.4/toolbox
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:3271-1
Container Tags        : suse/sle-micro/5.4/toolbox:12.1 , suse/sle-micro/5.4/toolbox:12.1-4.2.120 , suse/sle-micro/5.4/toolbox:latest
Container Release     : 4.2.120
Severity              : important
Type                  : security
References            : 1211078 1214922 1214924 1214925 1215004 1215006 1215033 CVE-2023-22652
                        CVE-2023-30078 CVE-2023-30079 CVE-2023-32181 CVE-2023-4733 CVE-2023-4734
                        CVE-2023-4735 CVE-2023-4738 CVE-2023-4752 CVE-2023-4781 
-----------------------------------------------------------------

The container suse/sle-micro/5.4/toolbox was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:3954-1
Released:    Tue Oct  3 20:09:47 2023
Summary:     Security update for libeconf
Type:        security
Severity:    important
References:  1211078,CVE-2023-22652,CVE-2023-30078,CVE-2023-30079,CVE-2023-32181
This update for libeconf fixes the following issues:

Update to version 0.5.2.

- CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in 'econf_writeFile' function (bsc#1211078).
- CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in 'read_file' function. (bsc#1211078)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:3955-1
Released:    Tue Oct  3 21:27:58 2023
Summary:     Security update for vim
Type:        security
Severity:    important
References:  1214922,1214924,1214925,1215004,1215006,1215033,CVE-2023-4733,CVE-2023-4734,CVE-2023-4735,CVE-2023-4738,CVE-2023-4752,CVE-2023-4781
This update for vim fixes the following issues:

Security fixes:

- CVE-2023-4733: Fixed use-after-free in function buflist_altfpos (bsc#1215004). 
- CVE-2023-4734: Fixed segmentation fault in function f_fullcommand (bsc#1214925). 
- CVE-2023-4735: Fixed out of bounds write in ops.c (bsc#1214924). 
- CVE-2023-4738: Fixed heap buffer overflow in vim_regsub_both (bsc#1214922). 
- CVE-2023-4752: Fixed heap use-after-free in function ins_compl_get_exp (bsc#1215006). 
- CVE-2023-4781: Fixed heap buffer overflow in function vim_regsub_both (bsc#1215033).

Other fixes:

- Update to version 9.0 with patch level 1894,
  for the complete list of changes see https://github.com/vim/vim/compare/v9.0.1443...v9.0.1894
- Use app icons generated from vimlogo.eps in the source tarball;
  add higher resolution icons of sizes 128x128, 256x256, and 512x512 as png sources


The following package changes have been done:

- libeconf0-0.5.2-150400.3.6.1 updated
- vim-data-common-9.0.1894-150000.5.54.1 updated
- vim-9.0.1894-150000.5.54.1 updated
- container:sles15-image-15.0.0-27.14.102 updated

SUSE: 2023:3271-1 suse/sle-micro/5.4/toolbox Security Update

October 5, 2023
The container suse/sle-micro/5.4/toolbox was updated

Summary

Advisory ID: SUSE-SU-2023:3954-1 Released: Tue Oct 3 20:09:47 2023 Summary: Security update for libeconf Type: security Severity: important Advisory ID: SUSE-SU-2023:3955-1 Released: Tue Oct 3 21:27:58 2023 Summary: Security update for vim Type: security Severity: important

References

References : 1211078 1214922 1214924 1214925 1215004 1215006 1215033 CVE-2023-22652

CVE-2023-30078 CVE-2023-30079 CVE-2023-32181 CVE-2023-4733 CVE-2023-4734

CVE-2023-4735 CVE-2023-4738 CVE-2023-4752 CVE-2023-4781

1211078,CVE-2023-22652,CVE-2023-30078,CVE-2023-30079,CVE-2023-32181

This update for libeconf fixes the following issues:

Update to version 0.5.2.

- CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in 'econf_writeFile' function (bsc#1211078).

- CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in 'read_file' function. (bsc#1211078)

1214922,1214924,1214925,1215004,1215006,1215033,CVE-2023-4733,CVE-2023-4734,CVE-2023-4735,CVE-2023-4738,CVE-2023-4752,CVE-2023-4781

This update for vim fixes the following issues:

Security fixes:

- CVE-2023-4733: Fixed use-after-free in function buflist_altfpos (bsc#1215004).

- CVE-2023-4734: Fixed segmentation fault in function f_fullcommand (bsc#1214925).

- CVE-2023-4735: Fixed out of bounds write in ops.c (bsc#1214924).

- CVE-2023-4738: Fixed heap buffer overflow in vim_regsub_both (bsc#1214922).

- CVE-2023-4752: Fixed heap use-after-free in function ins_compl_get_exp (bsc#1215006).

- CVE-2023-4781: Fixed heap buffer overflow in function vim_regsub_both (bsc#1215033).

Other fixes:

- Update to version 9.0 with patch level 1894,

for the complete list of changes see https://github.com/vim/vim/compare/v9.0.1443...v9.0.1894

- Use app icons generated from vimlogo.eps in the source tarball;

add higher resolution icons of sizes 128x128, 256x256, and 512x512 as png sources

The following package changes have been done:

- libeconf0-0.5.2-150400.3.6.1 updated

- vim-data-common-9.0.1894-150000.5.54.1 updated

- vim-9.0.1894-150000.5.54.1 updated

- container:sles15-image-15.0.0-27.14.102 updated

Severity
Container Advisory ID : SUSE-CU-2023:3271-1
Container Tags : suse/sle-micro/5.4/toolbox:12.1 , suse/sle-micro/5.4/toolbox:12.1-4.2.120 , suse/sle-micro/5.4/toolbox:latest
Container Release : 4.2.120
Severity : important
Type : security

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo