Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5319: Red Hat Security Advisory: vim security update

An update for vim is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1621: vim: heap buffer overflow
  • CVE-2022-1629: vim: buffer over-read
Red Hat Security Data
#vulnerability#linux#red_hat#buffer_overflow#ibm#sap

Synopsis

Moderate: vim security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for vim is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Vim (Vi IMproved) is an updated and improved version of the vi editor.

Security Fix(es):

  • vim: heap buffer overflow (CVE-2022-1621)
  • vim: buffer over-read (CVE-2022-1629)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2083924 - CVE-2022-1621 vim: heap buffer overflow
  • BZ - 2083931 - CVE-2022-1629 vim: buffer over-read

Red Hat Enterprise Linux for x86_64 8

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

x86_64

vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-common-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

x86_64

vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-common-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

x86_64

vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-common-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

s390x

vim-X11-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 18171d762b680fd60a28e395721b65c9549b7f4a53f99c5e2d62bf1bdd440aca

vim-X11-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: a61e3798ca1c9592be2b74f42c5bf2ccc3687fb2be960e18bc52ea3e7c7ab71a

vim-X11-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: a61e3798ca1c9592be2b74f42c5bf2ccc3687fb2be960e18bc52ea3e7c7ab71a

vim-common-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 2249146da9f5b600d53c66778c2edc97e5fbd8c17003c3b829b2ca638b801b04

vim-common-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: ffedc3772007c76392a44ddeb9d1078fcab5a83385d99529bccb529455d0e559

vim-common-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: ffedc3772007c76392a44ddeb9d1078fcab5a83385d99529bccb529455d0e559

vim-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 319404b861e7714b29016377e53c3d527fbe935c54637a5b6dbb4d5eb50be677

vim-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 319404b861e7714b29016377e53c3d527fbe935c54637a5b6dbb4d5eb50be677

vim-debugsource-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 9b78341f65b9b4d542ab74e84abccad6ae45f7ec53357158039fc11c94d52a3b

vim-debugsource-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 9b78341f65b9b4d542ab74e84abccad6ae45f7ec53357158039fc11c94d52a3b

vim-enhanced-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: b8dcb4564244cb1246a8467dbcb1e028bf5a6560afd92b3070ad0338347a3613

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: a651b17c618bdbe079ab05b7f7fea48a1289d7d3d92c69cc6fdb50b5cf6c103d

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: a651b17c618bdbe079ab05b7f7fea48a1289d7d3d92c69cc6fdb50b5cf6c103d

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: b81c8070eda5edb463459e1c8887ee3229f2342e419e15a85a31a54c75a28baf

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 8cba5a11bebf2d7c3acb417f6e8256f237f830c57fe5dbbbfa1f02ca13998841

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 8cba5a11bebf2d7c3acb417f6e8256f237f830c57fe5dbbbfa1f02ca13998841

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

s390x

vim-X11-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 18171d762b680fd60a28e395721b65c9549b7f4a53f99c5e2d62bf1bdd440aca

vim-X11-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: a61e3798ca1c9592be2b74f42c5bf2ccc3687fb2be960e18bc52ea3e7c7ab71a

vim-X11-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: a61e3798ca1c9592be2b74f42c5bf2ccc3687fb2be960e18bc52ea3e7c7ab71a

vim-common-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 2249146da9f5b600d53c66778c2edc97e5fbd8c17003c3b829b2ca638b801b04

vim-common-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: ffedc3772007c76392a44ddeb9d1078fcab5a83385d99529bccb529455d0e559

vim-common-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: ffedc3772007c76392a44ddeb9d1078fcab5a83385d99529bccb529455d0e559

vim-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 319404b861e7714b29016377e53c3d527fbe935c54637a5b6dbb4d5eb50be677

vim-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 319404b861e7714b29016377e53c3d527fbe935c54637a5b6dbb4d5eb50be677

vim-debugsource-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 9b78341f65b9b4d542ab74e84abccad6ae45f7ec53357158039fc11c94d52a3b

vim-debugsource-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 9b78341f65b9b4d542ab74e84abccad6ae45f7ec53357158039fc11c94d52a3b

vim-enhanced-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: b8dcb4564244cb1246a8467dbcb1e028bf5a6560afd92b3070ad0338347a3613

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: a651b17c618bdbe079ab05b7f7fea48a1289d7d3d92c69cc6fdb50b5cf6c103d

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: a651b17c618bdbe079ab05b7f7fea48a1289d7d3d92c69cc6fdb50b5cf6c103d

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: b81c8070eda5edb463459e1c8887ee3229f2342e419e15a85a31a54c75a28baf

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 8cba5a11bebf2d7c3acb417f6e8256f237f830c57fe5dbbbfa1f02ca13998841

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm

SHA-256: 8cba5a11bebf2d7c3acb417f6e8256f237f830c57fe5dbbbfa1f02ca13998841

Red Hat Enterprise Linux for Power, little endian 8

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

ppc64le

vim-X11-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 7654d650c81fb5be3dfdc85d4c78d7df15a8cd0b426d593de513c0829d197e31

vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029

vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029

vim-common-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 1bfcec861edd9d4a7ca6a91139000303b0be2114c2d5a06ead98899a786cbf51

vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf

vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf

vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1

vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1

vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730

vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730

vim-enhanced-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 2f51e956c4c7a0c75dfc3e3647ae363cae85b10f99edf8475bd70bd02c3333c9

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 6bc2ee12c046a98b7058c900aa2c4d7fd4496ddb604891a9241c040a143cc6ce

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

ppc64le

vim-X11-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 7654d650c81fb5be3dfdc85d4c78d7df15a8cd0b426d593de513c0829d197e31

vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029

vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029

vim-common-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 1bfcec861edd9d4a7ca6a91139000303b0be2114c2d5a06ead98899a786cbf51

vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf

vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf

vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1

vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1

vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730

vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730

vim-enhanced-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 2f51e956c4c7a0c75dfc3e3647ae363cae85b10f99edf8475bd70bd02c3333c9

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 6bc2ee12c046a98b7058c900aa2c4d7fd4496ddb604891a9241c040a143cc6ce

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24

Red Hat Virtualization Host 4 for RHEL 8

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

x86_64

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

x86_64

vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-common-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

Red Hat Enterprise Linux for ARM 64 8

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

aarch64

vim-X11-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 68047bf3cc9b1ad3aaa1856cb393d8d9056b0406808c31fd5f3ca600b2c4e663

vim-X11-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 5d616fff6788ba831bdad8850526b43e3e5d3f159764ca7790aef886b1b04e4d

vim-X11-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 5d616fff6788ba831bdad8850526b43e3e5d3f159764ca7790aef886b1b04e4d

vim-common-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 8b56cb1c61449f5df2d67e9e0bbb8e1d81fd561ebdf3173f0838179e1ba7d13c

vim-common-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 7d83584418e76cc9113b14885090caf7ac2b6942b7df3e323d5f643e0c30ffd7

vim-common-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 7d83584418e76cc9113b14885090caf7ac2b6942b7df3e323d5f643e0c30ffd7

vim-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 3b49b150f4b50ad0eda6dad579e3c1065fbb7ed5600f0eca2589d492165cbdd8

vim-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 3b49b150f4b50ad0eda6dad579e3c1065fbb7ed5600f0eca2589d492165cbdd8

vim-debugsource-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: d7e2a1c4cf6dbe4fae9d9fb87cf02ea80167c1206e646cc09b45d740cdefbbbc

vim-debugsource-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: d7e2a1c4cf6dbe4fae9d9fb87cf02ea80167c1206e646cc09b45d740cdefbbbc

vim-enhanced-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 11a95f5d09c4cb3fa02a6f0becbb75a9e708bd350d120a5bbca55c776a4f51cd

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: febb12a4556bb3770d889ae977b5715b47990cf4a9ad8faf2b083701c7217e51

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: febb12a4556bb3770d889ae977b5715b47990cf4a9ad8faf2b083701c7217e51

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: d6ff178854544a759d18ce080afa81a06a39c213ceaefa406c2204c50a1e2e2b

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 4ceeb8ddcfc7a4b869d925f653cd98f4f2910f42b6a221c6495799f854428f0f

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 4ceeb8ddcfc7a4b869d925f653cd98f4f2910f42b6a221c6495799f854428f0f

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

aarch64

vim-X11-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 68047bf3cc9b1ad3aaa1856cb393d8d9056b0406808c31fd5f3ca600b2c4e663

vim-X11-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 5d616fff6788ba831bdad8850526b43e3e5d3f159764ca7790aef886b1b04e4d

vim-X11-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 5d616fff6788ba831bdad8850526b43e3e5d3f159764ca7790aef886b1b04e4d

vim-common-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 8b56cb1c61449f5df2d67e9e0bbb8e1d81fd561ebdf3173f0838179e1ba7d13c

vim-common-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 7d83584418e76cc9113b14885090caf7ac2b6942b7df3e323d5f643e0c30ffd7

vim-common-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 7d83584418e76cc9113b14885090caf7ac2b6942b7df3e323d5f643e0c30ffd7

vim-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 3b49b150f4b50ad0eda6dad579e3c1065fbb7ed5600f0eca2589d492165cbdd8

vim-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 3b49b150f4b50ad0eda6dad579e3c1065fbb7ed5600f0eca2589d492165cbdd8

vim-debugsource-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: d7e2a1c4cf6dbe4fae9d9fb87cf02ea80167c1206e646cc09b45d740cdefbbbc

vim-debugsource-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: d7e2a1c4cf6dbe4fae9d9fb87cf02ea80167c1206e646cc09b45d740cdefbbbc

vim-enhanced-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 11a95f5d09c4cb3fa02a6f0becbb75a9e708bd350d120a5bbca55c776a4f51cd

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: febb12a4556bb3770d889ae977b5715b47990cf4a9ad8faf2b083701c7217e51

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: febb12a4556bb3770d889ae977b5715b47990cf4a9ad8faf2b083701c7217e51

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: d6ff178854544a759d18ce080afa81a06a39c213ceaefa406c2204c50a1e2e2b

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 4ceeb8ddcfc7a4b869d925f653cd98f4f2910f42b6a221c6495799f854428f0f

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm

SHA-256: 4ceeb8ddcfc7a4b869d925f653cd98f4f2910f42b6a221c6495799f854428f0f

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

ppc64le

vim-X11-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 7654d650c81fb5be3dfdc85d4c78d7df15a8cd0b426d593de513c0829d197e31

vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029

vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029

vim-common-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 1bfcec861edd9d4a7ca6a91139000303b0be2114c2d5a06ead98899a786cbf51

vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf

vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf

vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1

vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1

vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730

vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730

vim-enhanced-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 2f51e956c4c7a0c75dfc3e3647ae363cae85b10f99edf8475bd70bd02c3333c9

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: 6bc2ee12c046a98b7058c900aa2c4d7fd4496ddb604891a9241c040a143cc6ce

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm

SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

vim-8.0.1763-19.el8_6.2.src.rpm

SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946

x86_64

vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3

vim-common-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc

vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad

vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm

SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e

vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm

SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9

Related news

Ubuntu Security Notice USN-5995-1

Ubuntu Security Notice 5995-1 - It was discovered that Vim incorrectly handled memory when opening certain files. If an attacker could trick a user into opening a specially crafted file, it could cause Vim to crash, or possible execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

CVE-2022-26730: About the security content of macOS Ventura 13

A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution.

Ubuntu Security Notice USN-5613-1

Ubuntu Security Notice 5613-1 - It was discovered that Vim was not properly performing bounds checks when executing spell suggestion commands. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. It was discovered that Vim was using freed memory when dealing with regular expressions through its old regular expression engine. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution.

RHSA-2022:6526: Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2021-44716: golang: net/http: limit growth of header canonicalization cache * CVE-2021-44717: golang: syscall: don't close fd 0 on ForkExec error * CVE-2022-1798: kubeVirt: Arbitrary file read on t...

Gentoo Linux Security Advisory 202208-32

Gentoo Linux Security Advisory 202208-32 - Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. Versions less than 9.0.0060 are affected.

Red Hat Security Advisory 2022-5070-01

Red Hat Security Advisory 2022-5070-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include denial of service, out of bounds read, and traversal vulnerabilities.

Red Hat Security Advisory 2022-5909-01

Red Hat Security Advisory 2022-5909-01 - Openshift Logging Bug Fix Release. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-5908-01

Red Hat Security Advisory 2022-5908-01 - Openshift Logging Bug Fix Release. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2022:5909: Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.2.13)

Openshift Logging Bug Fix Release (5.2.13) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

RHSA-2022:5908: Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.3.10)

Openshift Logging Bug Fix Release (5.3.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

Red Hat Security Advisory 2022-5840-01

Red Hat Security Advisory 2022-5840-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.

RHSA-2022:5840: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1365: cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-29526: golang: syscall: faccessat checks wrong group

Red Hat Security Advisory 2022-5531-01

Red Hat Security Advisory 2022-5531-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs.

Red Hat Security Advisory 2022-5556-01

Red Hat Security Advisory 2022-5556-01 - Logging Subsystem 5.4.3 has security updates. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-5704-01

Red Hat Security Advisory 2022-5704-01 - Updated images are now available for Red Hat Advanced Cluster Security. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:5704: Red Hat Security Advisory: ACS 3.71 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security. The updated image includes bug fixes and feature improvements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29173: go-tuf: No protection against rollback attacks for roles other than root

Red Hat Security Advisory 2022-5673-01

Red Hat Security Advisory 2022-5673-01 - Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview. Issues addressed include a code execution vulnerability.

RHSA-2022:5673: Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview

Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-41103: containerd: insufficiently restricted permissions on container root and plugin directories * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)

RHSA-2022:5556: Red Hat Security Advisory: Logging Subsystem 5.4.3 - Red Hat OpenShift security update

Logging Subsystem 5.4.3 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

RHSA-2022:5531: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.1 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account

Red Hat Security Advisory 2022-5242-01

Red Hat Security Advisory 2022-5242-01 - Vim is an updated and improved version of the vi editor. Issues addressed include buffer over-read, buffer overflow, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5242-01

Red Hat Security Advisory 2022-5242-01 - Vim is an updated and improved version of the vi editor. Issues addressed include buffer over-read, buffer overflow, and use-after-free vulnerabilities.

RHSA-2022:5242: Red Hat Security Advisory: vim security update

An update for vim is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0554: vim: Use of Out-of-range Pointer Offset in vim * CVE-2022-0943: vim: Heap-based Buffer Overflow occurs in vim * CVE-2022-1154: vim: use after free in utf_ptr2char * CVE-2022-1420: vim: Out-of-range Pointer Offset * CVE-2022-1621: vim: heap buffer overflow * CVE-2022-1629: vim: buffer over-read

RHSA-2022:5242: Red Hat Security Advisory: vim security update

An update for vim is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0554: vim: Use of Out-of-range Pointer Offset in vim * CVE-2022-0943: vim: Heap-based Buffer Overflow occurs in vim * CVE-2022-1154: vim: use after free in utf_ptr2char * CVE-2022-1420: vim: Out-of-range Pointer Offset * CVE-2022-1621: vim: heap buffer overflow * CVE-2022-1629: vim: buffer over-read

Ubuntu Security Notice USN-5460-1

Ubuntu Security Notice 5460-1 - It was discovered that Vim was incorrectly processing Vim buffers. An attacker could possibly use this issue to perform illegal memory access and expose sensitive information. It was discovered that Vim was not properly performing bounds checks for column numbers when replacing tabs with spaces or spaces with tabs, which could cause a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.

CVE-2022-1621: Heap buffer overflow in vim_strncpy find_word in vim

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

CVE-2022-1621

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

CVE-2022-1629: patch 8.2.4925: trailing backslash may cause reading past end of line · vim/vim@53a7028

Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution

CVE-2022-1629: patch 8.2.4925: trailing backslash may cause reading past end of line · vim/vim@53a7028

Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution