<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for vim</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:03240-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-09-16T19:57:09Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-09-16T19:57:09Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-09-16T19:57:09Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for vim</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for vim fixes the following issues:

Update to version 9.1.1629.
    
- CVE-2025-53905: Fixed a path traversal issue in tar.vim plugin that may allow for file overwriting when opening
  specially crafted tar files (bsc#1246604).
- CVE-2025-53906: Fixed a path traversal issue in zip.vim plugin that may allow for file overwriting when opening
  specially crafted zip files (bsc#1246602).
- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938).
- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/sle-micro-rancher/5.2:latest-2025-3240,Container suse/sle-micro-rancher/5.3:latest-2025-3240,Container suse/sle-micro-rancher/5.4:latest-2025-3240,Container suse/sle-micro/5.1/toolbox:latest-2025-3240,Container suse/sle-micro/5.2/toolbox:latest-2025-3240,Container suse/sle-micro/5.3/toolbox:latest-2025-3240,Container suse/sle-micro/5.4/toolbox:latest-2025-3240,SUSE-2025-3240,SUSE-SLE-Micro-5.3-2025-3240,SUSE-SLE-Micro-5.4-2025-3240,SUSE-SUSE-MicroOS-5.1-2025-3240,SUSE-SUSE-MicroOS-5.2-2025-3240</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503240-1/</URL>
      <Description>Link for SUSE-SU-2025:03240-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-September/041716.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:03240-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246602</URL>
      <Description>SUSE Bug 1246602</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246604</URL>
      <Description>SUSE Bug 1246604</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247938</URL>
      <Description>SUSE Bug 1247938</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247939</URL>
      <Description>SUSE Bug 1247939</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-53905/</URL>
      <Description>SUSE CVE CVE-2025-53905 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-53906/</URL>
      <Description>SUSE CVE CVE-2025-53906 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-55157/</URL>
      <Description>SUSE CVE CVE-2025-55157 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-55158/</URL>
      <Description>SUSE CVE CVE-2025-55158 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/sle-micro-rancher/5.2:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro-rancher/5.2:latest">
        <FullProductName ProductID="Container suse/sle-micro-rancher/5.2:latest">Container suse/sle-micro-rancher/5.2:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro-rancher/5.3:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro-rancher/5.3:latest">
        <FullProductName ProductID="Container suse/sle-micro-rancher/5.3:latest">Container suse/sle-micro-rancher/5.3:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro-rancher/5.4:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro-rancher/5.4:latest">
        <FullProductName ProductID="Container suse/sle-micro-rancher/5.4:latest">Container suse/sle-micro-rancher/5.4:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro/5.1/toolbox:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/5.1/toolbox:latest">
        <FullProductName ProductID="Container suse/sle-micro/5.1/toolbox:latest">Container suse/sle-micro/5.1/toolbox:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro/5.2/toolbox:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/5.2/toolbox:latest">
        <FullProductName ProductID="Container suse/sle-micro/5.2/toolbox:latest">Container suse/sle-micro/5.2/toolbox:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro/5.3/toolbox:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/5.3/toolbox:latest">
        <FullProductName ProductID="Container suse/sle-micro/5.3/toolbox:latest">Container suse/sle-micro/5.3/toolbox:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro/5.4/toolbox:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/5.4/toolbox:latest">
        <FullProductName ProductID="Container suse/sle-micro/5.4/toolbox:latest">Container suse/sle-micro/5.4/toolbox:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.1">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1" CPE="cpe:/o:suse:suse-microos:5.1">SUSE Linux Enterprise Micro 5.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.2">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2" CPE="cpe:/o:suse:suse-microos:5.2">SUSE Linux Enterprise Micro 5.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.3">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3" CPE="cpe:/o:suse:sle-micro:5.3">SUSE Linux Enterprise Micro 5.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.4">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4" CPE="cpe:/o:suse:sle-micro:5.4">SUSE Linux Enterprise Micro 5.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="vim-data-common-9.1.1629-150000.5.78.1">
      <FullProductName ProductID="vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-small-9.1.1629-150000.5.78.1">
      <FullProductName ProductID="vim-small-9.1.1629-150000.5.78.1">vim-small-9.1.1629-150000.5.78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-9.1.1629-150000.5.78.1">
      <FullProductName ProductID="vim-9.1.1629-150000.5.78.1">vim-9.1.1629-150000.5.78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gvim-9.1.1629-150000.5.78.1">
      <FullProductName ProductID="gvim-9.1.1629-150000.5.78.1">gvim-9.1.1629-150000.5.78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-data-9.1.1629-150000.5.78.1">
      <FullProductName ProductID="vim-data-9.1.1629-150000.5.78.1">vim-data-9.1.1629-150000.5.78.1</FullProductName>
    </Branch>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.2:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.2:latest:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro-rancher/5.2:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-small-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.2:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.2:latest:vim-small-9.1.1629-150000.5.78.1">vim-small-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro-rancher/5.2:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.3:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.3:latest:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro-rancher/5.3:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-small-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.3:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.3:latest:vim-small-9.1.1629-150000.5.78.1">vim-small-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro-rancher/5.3:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.4:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.4:latest:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro-rancher/5.4:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-small-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.4:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.4:latest:vim-small-9.1.1629-150000.5.78.1">vim-small-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro-rancher/5.4:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.1/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.1/toolbox:latest:vim-9.1.1629-150000.5.78.1">vim-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro/5.1/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.1/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.1/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro/5.1/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.2/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.2/toolbox:latest:vim-9.1.1629-150000.5.78.1">vim-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro/5.2/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.2/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.2/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro/5.2/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.3/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.3/toolbox:latest:vim-9.1.1629-150000.5.78.1">vim-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro/5.3/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.3/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.3/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro/5.3/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.4/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.4/toolbox:latest:vim-9.1.1629-150000.5.78.1">vim-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro/5.4/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.4/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.4/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of Container suse/sle-micro/5.4/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.1">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of SUSE Linux Enterprise Micro 5.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-small-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.1">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1">vim-small-9.1.1629-150000.5.78.1 as a component of SUSE Linux Enterprise Micro 5.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-small-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1">vim-small-9.1.1629-150000.5.78.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.3">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of SUSE Linux Enterprise Micro 5.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-small-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.3">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1">vim-small-9.1.1629-150000.5.78.1 as a component of SUSE Linux Enterprise Micro 5.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.4">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1">vim-data-common-9.1.1629-150000.5.78.1 as a component of SUSE Linux Enterprise Micro 5.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-small-9.1.1629-150000.5.78.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.4">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1">vim-small-9.1.1629-150000.5.78.1 as a component of SUSE Linux Enterprise Micro 5.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim's tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2025-53905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.1/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.1/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503240-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-53905.html</URL>
        <Description>CVE-2025-53905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246604</URL>
        <Description>SUSE Bug 1246604</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim's zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2025-53906</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.1/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.1/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503240-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-53906.html</URL>
        <Description>CVE-2025-53906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246602</URL>
        <Description>SUSE Bug 1246602</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim's internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.</Note>
    </Notes>
    <CVE>CVE-2025-55157</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.1/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.1/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503240-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-55157.html</URL>
        <Description>CVE-2025-55157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247938</URL>
        <Description>SUSE Bug 1247938</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim's internal typed value (typval_T) management. Specifically, the clear_tv() function may attempt to free memory that has already been deallocated, due to improper lifetime handling in the handle_import / ex_import code paths. The vulnerability can only be triggered if a user explicitly opens and executes a specially crafted Vim script. This issue has been patched in version 9.1.1406.</Note>
    </Notes>
    <CVE>CVE-2025-55158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.1/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.1/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:vim-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503240-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-55158.html</URL>
        <Description>CVE-2025-55158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247939</URL>
        <Description>SUSE Bug 1247939</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
