First published: Tue Nov 12 2024(Updated: )
Low: vim security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/vim | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-common | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-common-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-debugsource | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-enhanced | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-enhanced-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-filesystem | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-minimal | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-minimal-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-common | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-common-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-debugsource | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-enhanced | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-enhanced-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-minimal | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-minimal-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-common | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-common-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-debugsource | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-enhanced | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-enhanced-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-minimal | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-minimal-debuginfo | <8.2.2637-21.el9 | 8.2.2637-21.el9 |
redhat/vim-common | <8.2.2637-21.el9.aa | 8.2.2637-21.el9.aa |
redhat/vim-common-debuginfo | <8.2.2637-21.el9.aa | 8.2.2637-21.el9.aa |
redhat/vim-debuginfo | <8.2.2637-21.el9.aa | 8.2.2637-21.el9.aa |
redhat/vim-debugsource | <8.2.2637-21.el9.aa | 8.2.2637-21.el9.aa |
redhat/vim-enhanced | <8.2.2637-21.el9.aa | 8.2.2637-21.el9.aa |
redhat/vim-enhanced-debuginfo | <8.2.2637-21.el9.aa | 8.2.2637-21.el9.aa |
redhat/vim-minimal | <8.2.2637-21.el9.aa | 8.2.2637-21.el9.aa |
redhat/vim-minimal-debuginfo | <8.2.2637-21.el9.aa | 8.2.2637-21.el9.aa |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:9405 is classified as low.
To fix RHSA-2024:9405, update to the latest version of the vim package, specifically version 8.2.2637-21.el9.
RHSA-2024:9405 addresses a heap-based buffer overflow vulnerability identified as CVE-2021-3903.
RHSA-2024:9405 affects Red Hat Enterprise Linux for various architectures including Power, x86_64, IBM z Systems, and ARM 64.
Yes, the vulnerability in RHSA-2024:9405 could potentially be exploited to allow unauthorized access or cause instability in affected systems.