Headline
RHSA-2022:5319: Red Hat Security Advisory: vim security update
An update for vim is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-1621: vim: heap buffer overflow
- CVE-2022-1629: vim: buffer over-read
Synopsis
Moderate: vim security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for vim is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
- vim: heap buffer overflow (CVE-2022-1621)
- vim: buffer over-read (CVE-2022-1629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2083924 - CVE-2022-1621 vim: heap buffer overflow
- BZ - 2083931 - CVE-2022-1629 vim: buffer over-read
Red Hat Enterprise Linux for x86_64 8
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
x86_64
vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-common-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
x86_64
vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-common-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
x86_64
vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-common-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
s390x
vim-X11-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 18171d762b680fd60a28e395721b65c9549b7f4a53f99c5e2d62bf1bdd440aca
vim-X11-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: a61e3798ca1c9592be2b74f42c5bf2ccc3687fb2be960e18bc52ea3e7c7ab71a
vim-X11-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: a61e3798ca1c9592be2b74f42c5bf2ccc3687fb2be960e18bc52ea3e7c7ab71a
vim-common-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 2249146da9f5b600d53c66778c2edc97e5fbd8c17003c3b829b2ca638b801b04
vim-common-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: ffedc3772007c76392a44ddeb9d1078fcab5a83385d99529bccb529455d0e559
vim-common-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: ffedc3772007c76392a44ddeb9d1078fcab5a83385d99529bccb529455d0e559
vim-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 319404b861e7714b29016377e53c3d527fbe935c54637a5b6dbb4d5eb50be677
vim-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 319404b861e7714b29016377e53c3d527fbe935c54637a5b6dbb4d5eb50be677
vim-debugsource-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 9b78341f65b9b4d542ab74e84abccad6ae45f7ec53357158039fc11c94d52a3b
vim-debugsource-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 9b78341f65b9b4d542ab74e84abccad6ae45f7ec53357158039fc11c94d52a3b
vim-enhanced-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: b8dcb4564244cb1246a8467dbcb1e028bf5a6560afd92b3070ad0338347a3613
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: a651b17c618bdbe079ab05b7f7fea48a1289d7d3d92c69cc6fdb50b5cf6c103d
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: a651b17c618bdbe079ab05b7f7fea48a1289d7d3d92c69cc6fdb50b5cf6c103d
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: b81c8070eda5edb463459e1c8887ee3229f2342e419e15a85a31a54c75a28baf
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 8cba5a11bebf2d7c3acb417f6e8256f237f830c57fe5dbbbfa1f02ca13998841
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 8cba5a11bebf2d7c3acb417f6e8256f237f830c57fe5dbbbfa1f02ca13998841
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
s390x
vim-X11-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 18171d762b680fd60a28e395721b65c9549b7f4a53f99c5e2d62bf1bdd440aca
vim-X11-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: a61e3798ca1c9592be2b74f42c5bf2ccc3687fb2be960e18bc52ea3e7c7ab71a
vim-X11-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: a61e3798ca1c9592be2b74f42c5bf2ccc3687fb2be960e18bc52ea3e7c7ab71a
vim-common-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 2249146da9f5b600d53c66778c2edc97e5fbd8c17003c3b829b2ca638b801b04
vim-common-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: ffedc3772007c76392a44ddeb9d1078fcab5a83385d99529bccb529455d0e559
vim-common-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: ffedc3772007c76392a44ddeb9d1078fcab5a83385d99529bccb529455d0e559
vim-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 319404b861e7714b29016377e53c3d527fbe935c54637a5b6dbb4d5eb50be677
vim-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 319404b861e7714b29016377e53c3d527fbe935c54637a5b6dbb4d5eb50be677
vim-debugsource-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 9b78341f65b9b4d542ab74e84abccad6ae45f7ec53357158039fc11c94d52a3b
vim-debugsource-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 9b78341f65b9b4d542ab74e84abccad6ae45f7ec53357158039fc11c94d52a3b
vim-enhanced-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: b8dcb4564244cb1246a8467dbcb1e028bf5a6560afd92b3070ad0338347a3613
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: a651b17c618bdbe079ab05b7f7fea48a1289d7d3d92c69cc6fdb50b5cf6c103d
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: a651b17c618bdbe079ab05b7f7fea48a1289d7d3d92c69cc6fdb50b5cf6c103d
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: b81c8070eda5edb463459e1c8887ee3229f2342e419e15a85a31a54c75a28baf
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 8cba5a11bebf2d7c3acb417f6e8256f237f830c57fe5dbbbfa1f02ca13998841
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.s390x.rpm
SHA-256: 8cba5a11bebf2d7c3acb417f6e8256f237f830c57fe5dbbbfa1f02ca13998841
Red Hat Enterprise Linux for Power, little endian 8
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
ppc64le
vim-X11-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 7654d650c81fb5be3dfdc85d4c78d7df15a8cd0b426d593de513c0829d197e31
vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029
vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029
vim-common-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 1bfcec861edd9d4a7ca6a91139000303b0be2114c2d5a06ead98899a786cbf51
vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf
vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf
vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1
vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1
vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730
vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730
vim-enhanced-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 2f51e956c4c7a0c75dfc3e3647ae363cae85b10f99edf8475bd70bd02c3333c9
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 6bc2ee12c046a98b7058c900aa2c4d7fd4496ddb604891a9241c040a143cc6ce
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
ppc64le
vim-X11-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 7654d650c81fb5be3dfdc85d4c78d7df15a8cd0b426d593de513c0829d197e31
vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029
vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029
vim-common-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 1bfcec861edd9d4a7ca6a91139000303b0be2114c2d5a06ead98899a786cbf51
vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf
vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf
vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1
vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1
vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730
vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730
vim-enhanced-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 2f51e956c4c7a0c75dfc3e3647ae363cae85b10f99edf8475bd70bd02c3333c9
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 6bc2ee12c046a98b7058c900aa2c4d7fd4496ddb604891a9241c040a143cc6ce
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24
Red Hat Virtualization Host 4 for RHEL 8
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
x86_64
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
x86_64
vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-common-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
Red Hat Enterprise Linux for ARM 64 8
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
aarch64
vim-X11-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 68047bf3cc9b1ad3aaa1856cb393d8d9056b0406808c31fd5f3ca600b2c4e663
vim-X11-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 5d616fff6788ba831bdad8850526b43e3e5d3f159764ca7790aef886b1b04e4d
vim-X11-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 5d616fff6788ba831bdad8850526b43e3e5d3f159764ca7790aef886b1b04e4d
vim-common-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 8b56cb1c61449f5df2d67e9e0bbb8e1d81fd561ebdf3173f0838179e1ba7d13c
vim-common-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 7d83584418e76cc9113b14885090caf7ac2b6942b7df3e323d5f643e0c30ffd7
vim-common-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 7d83584418e76cc9113b14885090caf7ac2b6942b7df3e323d5f643e0c30ffd7
vim-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 3b49b150f4b50ad0eda6dad579e3c1065fbb7ed5600f0eca2589d492165cbdd8
vim-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 3b49b150f4b50ad0eda6dad579e3c1065fbb7ed5600f0eca2589d492165cbdd8
vim-debugsource-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: d7e2a1c4cf6dbe4fae9d9fb87cf02ea80167c1206e646cc09b45d740cdefbbbc
vim-debugsource-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: d7e2a1c4cf6dbe4fae9d9fb87cf02ea80167c1206e646cc09b45d740cdefbbbc
vim-enhanced-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 11a95f5d09c4cb3fa02a6f0becbb75a9e708bd350d120a5bbca55c776a4f51cd
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: febb12a4556bb3770d889ae977b5715b47990cf4a9ad8faf2b083701c7217e51
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: febb12a4556bb3770d889ae977b5715b47990cf4a9ad8faf2b083701c7217e51
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: d6ff178854544a759d18ce080afa81a06a39c213ceaefa406c2204c50a1e2e2b
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 4ceeb8ddcfc7a4b869d925f653cd98f4f2910f42b6a221c6495799f854428f0f
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 4ceeb8ddcfc7a4b869d925f653cd98f4f2910f42b6a221c6495799f854428f0f
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
aarch64
vim-X11-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 68047bf3cc9b1ad3aaa1856cb393d8d9056b0406808c31fd5f3ca600b2c4e663
vim-X11-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 5d616fff6788ba831bdad8850526b43e3e5d3f159764ca7790aef886b1b04e4d
vim-X11-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 5d616fff6788ba831bdad8850526b43e3e5d3f159764ca7790aef886b1b04e4d
vim-common-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 8b56cb1c61449f5df2d67e9e0bbb8e1d81fd561ebdf3173f0838179e1ba7d13c
vim-common-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 7d83584418e76cc9113b14885090caf7ac2b6942b7df3e323d5f643e0c30ffd7
vim-common-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 7d83584418e76cc9113b14885090caf7ac2b6942b7df3e323d5f643e0c30ffd7
vim-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 3b49b150f4b50ad0eda6dad579e3c1065fbb7ed5600f0eca2589d492165cbdd8
vim-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 3b49b150f4b50ad0eda6dad579e3c1065fbb7ed5600f0eca2589d492165cbdd8
vim-debugsource-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: d7e2a1c4cf6dbe4fae9d9fb87cf02ea80167c1206e646cc09b45d740cdefbbbc
vim-debugsource-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: d7e2a1c4cf6dbe4fae9d9fb87cf02ea80167c1206e646cc09b45d740cdefbbbc
vim-enhanced-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 11a95f5d09c4cb3fa02a6f0becbb75a9e708bd350d120a5bbca55c776a4f51cd
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: febb12a4556bb3770d889ae977b5715b47990cf4a9ad8faf2b083701c7217e51
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: febb12a4556bb3770d889ae977b5715b47990cf4a9ad8faf2b083701c7217e51
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: d6ff178854544a759d18ce080afa81a06a39c213ceaefa406c2204c50a1e2e2b
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 4ceeb8ddcfc7a4b869d925f653cd98f4f2910f42b6a221c6495799f854428f0f
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.aarch64.rpm
SHA-256: 4ceeb8ddcfc7a4b869d925f653cd98f4f2910f42b6a221c6495799f854428f0f
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
ppc64le
vim-X11-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 7654d650c81fb5be3dfdc85d4c78d7df15a8cd0b426d593de513c0829d197e31
vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029
vim-X11-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 35355444116df83a656981053b9ca4f485f170ba45b0b751a8f53be55bde8029
vim-common-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 1bfcec861edd9d4a7ca6a91139000303b0be2114c2d5a06ead98899a786cbf51
vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf
vim-common-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f03ea577441416422064854f4e6901e05d3983021479bb84782a5240df8f71bf
vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1
vim-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: fc0e9f20029d0d53083832b73776dbf174a5c2adeda56f3f6bb04056f0f393e1
vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730
vim-debugsource-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 22fc9f7292e79ebcbd6e98b32ad172ffa4176ca85f1c852de395b40da7327730
vim-enhanced-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 2f51e956c4c7a0c75dfc3e3647ae363cae85b10f99edf8475bd70bd02c3333c9
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: f95db98e83afef2e4661533fc07c1c138cf24d6ceef15bd62f6bc4049e367c94
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: 6bc2ee12c046a98b7058c900aa2c4d7fd4496ddb604891a9241c040a143cc6ce
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.ppc64le.rpm
SHA-256: b1b783aceae786efb23aa3d850a4c6381817593eb67b8dc67b6181b9fc8e5a24
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
vim-8.0.1763-19.el8_6.2.src.rpm
SHA-256: d127a8edcad43120fd9e9cd7aba0fa276e32ce1d54762a625778f5f575759946
x86_64
vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b66a14c7cce4a3600cf3ef948a6839c693fd8e46c1cf1170955a9f34bba66b18
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-X11-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 64ec65f2f2d98ce7cdd3510e8289d2f87b6292bad58fa9f37e9f92ce60b12ad3
vim-common-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 0d19bd7f8a80e7bb2c8111ca8265ad7d61cdd0c3b45e61e231d3d7ccf975bbc9
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-common-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 75f1e1c7a8a90864ad7e7acd639d4ee4cd337beee543dc565f871ab040042ffe
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: b8de276ae3a06ffd5a07e6a79d93c97a93b66a75d1f3e1f946eb5090827e34a5
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-debugsource-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 31df00ffb25b15c2f0adb73eea6380057827d063d885eba2f0dae035a6275bbc
vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 7bf5fcf83259a1ca52f0018fba031329a55b0fe065c0c5070e1aaa873a27e360
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-enhanced-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: 512d0466a99e81e34c128982d22c26e81eefe036db1d414db1167c2be0c61cad
vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm
SHA-256: 515fea74acc189be1ffdce289156280aa23b474420e79cc021af16a1d83d9a7e
vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f26fb62170723b24387bd1a0b4790f23f2031d0cc265b69ccc1b43d0be4bd02a
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
vim-minimal-debuginfo-8.0.1763-19.el8_6.2.x86_64.rpm
SHA-256: f4469c363d27146c0c003a59a64aedc794c5b58a6a20a20d95e4e4e24220a1d9
Related news
Ubuntu Security Notice 5995-1 - It was discovered that Vim incorrectly handled memory when opening certain files. If an attacker could trick a user into opening a specially crafted file, it could cause Vim to crash, or possible execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution.
Ubuntu Security Notice 5613-1 - It was discovered that Vim was not properly performing bounds checks when executing spell suggestion commands. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. It was discovered that Vim was using freed memory when dealing with regular expressions through its old regular expression engine. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution.
Red Hat OpenShift Virtualization release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2021-44716: golang: net/http: limit growth of header canonicalization cache * CVE-2021-44717: golang: syscall: don't close fd 0 on ForkExec error * CVE-2022-1798: kubeVirt: Arbitrary file read on t...
Gentoo Linux Security Advisory 202208-32 - Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. Versions less than 9.0.0060 are affected.
Red Hat Security Advisory 2022-5070-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include denial of service, out of bounds read, and traversal vulnerabilities.
Red Hat Security Advisory 2022-5909-01 - Openshift Logging Bug Fix Release. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat Security Advisory 2022-5908-01 - Openshift Logging Bug Fix Release. Issues addressed include denial of service and out of bounds read vulnerabilities.
Openshift Logging Bug Fix Release (5.2.13) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Openshift Logging Bug Fix Release (5.3.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Red Hat Security Advisory 2022-5840-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
The Migration Toolkit for Containers (MTC) 1.7.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1365: cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-29526: golang: syscall: faccessat checks wrong group
Red Hat Security Advisory 2022-5531-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs.
Red Hat Security Advisory 2022-5556-01 - Logging Subsystem 5.4.3 has security updates. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat Security Advisory 2022-5704-01 - Updated images are now available for Red Hat Advanced Cluster Security. Issues addressed include a privilege escalation vulnerability.
Updated images are now available for Red Hat Advanced Cluster Security. The updated image includes bug fixes and feature improvements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29173: go-tuf: No protection against rollback attacks for roles other than root
Red Hat Security Advisory 2022-5673-01 - Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview. Issues addressed include a code execution vulnerability.
Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-41103: containerd: insufficiently restricted permissions on container root and plugin directories * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)
Logging Subsystem 5.4.3 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account
Red Hat Security Advisory 2022-5242-01 - Vim is an updated and improved version of the vi editor. Issues addressed include buffer over-read, buffer overflow, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5242-01 - Vim is an updated and improved version of the vi editor. Issues addressed include buffer over-read, buffer overflow, and use-after-free vulnerabilities.
An update for vim is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0554: vim: Use of Out-of-range Pointer Offset in vim * CVE-2022-0943: vim: Heap-based Buffer Overflow occurs in vim * CVE-2022-1154: vim: use after free in utf_ptr2char * CVE-2022-1420: vim: Out-of-range Pointer Offset * CVE-2022-1621: vim: heap buffer overflow * CVE-2022-1629: vim: buffer over-read
An update for vim is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0554: vim: Use of Out-of-range Pointer Offset in vim * CVE-2022-0943: vim: Heap-based Buffer Overflow occurs in vim * CVE-2022-1154: vim: use after free in utf_ptr2char * CVE-2022-1420: vim: Out-of-range Pointer Offset * CVE-2022-1621: vim: heap buffer overflow * CVE-2022-1629: vim: buffer over-read
Ubuntu Security Notice 5460-1 - It was discovered that Vim was incorrectly processing Vim buffers. An attacker could possibly use this issue to perform illegal memory access and expose sensitive information. It was discovered that Vim was not properly performing bounds checks for column numbers when replacing tabs with spaces or spaces with tabs, which could cause a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.
Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution