File _patchinfo of Package patchinfo.27082
<patchinfo incident="27082">
<issue tracker="bnc" id="1193466">VUL-1: CVE-2021-4069: vim: use-after-free in ex_open() in src/ex_docmd.c</issue>
<issue tracker="bnc" id="1203194">VUL-1: CVE-2022-3134: vim: use after free in do_tag()</issue>
<issue tracker="bnc" id="1200701">VUL-1: CVE-2022-2129: vim: out of bounds write in vim_regsub_both()</issue>
<issue tracker="bnc" id="1192167">VUL-1: CVE-2021-3903: vim: heap-based buffer out of bounds read</issue>
<issue tracker="bnc" id="1200697">VUL-1: CVE-2022-2124: vim: out of bounds read in current_quote()</issue>
<issue tracker="bnc" id="1182324">vim is broken after update to vim-8.0.1568-lp152.8.3.1.x86_64.rpm</issue>
<issue tracker="bnc" id="1192903">VUL-0: CVE-2021-3973: vim: vim is vulnerable to Heap-based Buffer Overflow</issue>
<issue tracker="bnc" id="1191770">VUL-0: CVE-2021-3875: vim: heap-based buffer overflow</issue>
<issue tracker="bnc" id="1200884">Vim: Error on startup</issue>
<issue tracker="bnc" id="1191893">VUL-0: CVE-2021-3872: vim: heap-based buffer overflow in win_redr_status() drawscreen.c</issue>
<issue tracker="bnc" id="1195332">VUL-1: CVE-2022-0392: vim: Heap-based Buffer Overflow in vim prior to 8.2</issue>
<issue tracker="bnc" id="1198748">VUL-1: CVE-2022-1420: vim: Out-of-range Pointer Offset</issue>
<issue tracker="bnc" id="1203509">VUL-1: CVE-2022-3235: vim: Use After Free in GitHub prior to 9.0.0490.</issue>
<issue tracker="bnc" id="1195356">VUL-0: CVE-2022-0413: vim: use after free in src/ex_cmds.c</issue>
<issue tracker="bnc" id="1201136">VUL-1: CVE-2022-2287: vim: out of bounds read in suggest_trie_walk()</issue>
<issue tracker="bnc" id="1201132">VUL-1: CVE-2022-2264: vim: out of bounds read in inc()</issue>
<issue tracker="bnc" id="1201134">VUL-1: CVE-2022-2285: vim: negative size passed to memmove() due to integer overflow</issue>
<issue tracker="bnc" id="1201363">VUL-1: CVE-2022-2345: vim: Use After Free in GitHub repository vim prior to 9.0.0046.</issue>
<issue tracker="bnc" id="1192902">VUL-0: CVE-2021-3968: vim: vim is vulnerable to Heap-based Buffer Overflow</issue>
<issue tracker="bnc" id="1190570">VUL-0: CVE-2021-3796: vim: use-after-free in nv_replace() in normal.c</issue>
<issue tracker="bnc" id="1201151">VUL-1: CVE-2022-2210: vim: out of bounds read in ml_append_int()</issue>
<issue tracker="bnc" id="1192478">VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow</issue>
<issue tracker="bnc" id="1201356">VUL-1: CVE-2022-2343: vim: Heap-based Buffer Overflow in GitHub repository vim prior to 9.0.0044</issue>
<issue tracker="bnc" id="1203508">VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483.</issue>
<issue tracker="bnc" id="1193294">VUL-0: CVE-2021-4019: vim: vim is vulnerable to Heap-based Buffer Overflow</issue>
<issue tracker="bnc" id="1194217">VUL-1: CVE-2021-4192: vim: vulnerable to Use After Free</issue>
<issue tracker="bnc" id="1202552">VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference in generate_loadvar()</issue>
<issue tracker="bnc" id="1200700">VUL-1: CVE-2022-2126: vim: out of bounds read in suggest_trie_walk()</issue>
<issue tracker="bnc" id="1201152">VUL-1: CVE-2022-2208: vim: null pointer dereference in diff_check()</issue>
<issue tracker="bnc" id="1194093">VUL-1: CVE-2021-4166: vim: vim is vulnerable to Out-of-bounds Read</issue>
<issue tracker="bnc" id="1195203">VUL-1: CVE-2022-0359: vim: heap-based buffer overflow in init_ccline() in ex_getln.c</issue>
<issue tracker="bnc" id="1194872">VUL-0: CVE-2022-0261: vim: Heap-based Buffer Overflow in vim prior to 8.2.</issue>
<issue tracker="bnc" id="1203799">VUL-1: CVE-2022-3278: vim: NULL pointer dereference in eval_next_non_blank() in eval.c</issue>
<issue tracker="bnc" id="1192904">VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use After Free</issue>
<issue tracker="bnc" id="1194556">VUL-0: CVE-2021-46059: vim: A Pointer Dereference vulnerability exists in Vim 8.2.3883 via the vim_regexec_multi function at regexp.c, which causes a denial of service.</issue>
<issue tracker="bnc" id="1202051">VUL-1: CVE-2022-2598: vim: Undefined Behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput()</issue>
<issue tracker="bnc" id="1195004">VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2.</issue>
<issue tracker="bnc" id="1202862">VUL-1: CVE-2022-3016: vim: Use After Free in vim prior to 9.0.0285</issue>
<issue tracker="bnc" id="1202049">VUL-1: CVE-2022-2580: vim: Heap-based Buffer Overflow related to eval_string()</issue>
<issue tracker="bnc" id="1195066">VUL-1: CVE-2022-0319: vim: Out-of-bounds Read in vim/vim prior to 8.2.</issue>
<issue tracker="bnc" id="1194885">VUL-1: CVE-2022-0213: vim: vim is vulnerable to Heap-based Buffer Overflow</issue>
<issue tracker="bnc" id="1201155">VUL-1: CVE-2022-2206: vim: out of bounds read in msg_outtrans_attr()</issue>
<issue tracker="bnc" id="1202687">VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240</issue>
<issue tracker="bnc" id="1201359">VUL-1: CVE-2022-2344: vim: Another Heap-based Buffer Overflow vim prior to 9.0.0045</issue>
<issue tracker="bnc" id="1199936">VUL-1: CVE-2022-1851: vim: out of bounds read</issue>
<issue tracker="bnc" id="1173256">vim: now owned files</issue>
<issue tracker="bnc" id="1070955">VUL-1: CVE-2017-17087: vim: Sets the group ownership of a .swp file to the editor's primary group, which allows local users to obtain sensitive information</issue>
<issue tracker="bnc" id="1201154">VUL-1: CVE-2022-2257: vim: out of bounds read in msg_outtrans_special()</issue>
<issue tracker="bnc" id="1194388">VUL-1: CVE-2022-0128: vim: vim is vulnerable to Out-of-bounds Read</issue>
<issue tracker="bnc" id="1174564">vim-small has no /usr/bin/vi link</issue>
<issue tracker="bnc" id="1202511">VUL-1: CVE-2022-2862: vim: use-after-free in compile_nested_function()</issue>
<issue tracker="bnc" id="1202046">VUL-1: CVE-2022-2571: vim: Heap-based Buffer Overflow related to ins_comp_get_next_word_or_line()</issue>
<issue tracker="bnc" id="1203797">VUL-1: CVE-2022-3297: vim: use-after-free in process_next_cpt_value() at insexpand.c</issue>
<issue tracker="bnc" id="1200698">VUL-1: CVE-2022-2125: vim: out of bounds read in get_lisp_indent()</issue>
<issue tracker="bnc" id="1199651">VUL-1: CVE-2022-1735: vim: heap buffer overflow</issue>
<issue tracker="bnc" id="1195354">VUL-0: CVE-2022-0407: vim: Heap-based Buffer Overflow in Conda vim prior to 8.2.</issue>
<issue tracker="bnc" id="1200904">VUL-1: CVE-2022-2175: vim: Buffer Over-read through cmdline_insert_reg()</issue>
<issue tracker="bnc" id="1199745">VUL-1: CVE-2022-1785: vim: Out-of-bounds Write</issue>
<issue tracker="bnc" id="1202050">VUL-1: CVE-2022-2581: vim: Out-of-bounds Read related to cstrchr()</issue>
<issue tracker="bnc" id="1204779">VUL-0: CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c</issue>
<issue tracker="bnc" id="1202414">VUL-1: CVE-2022-2819: vim: Heap-based Buffer Overflow in compile_lock_unlock()</issue>
<issue tracker="bnc" id="1200732">VUL-1: CVE-2022-1720: vim: out of bounds read in grab_file_name()</issue>
<issue tracker="bnc" id="1203152">VUL-1: CVE-2022-2982: vim: use after free in qf_fill_buffer()</issue>
<issue tracker="bnc" id="1200011">VUL-1: CVE-2022-1898: vim: Use After Free in vim prior to 8.2</issue>
<issue tracker="bnc" id="1202420">VUL-1: CVE-2022-2817: vim: Use After Free in f_assert_fails()</issue>
<issue tracker="bnc" id="1203155">VUL-1: CVE-2022-2980: vim: null pointer dereference in do_mouse()</issue>
<issue tracker="bnc" id="1202512">VUL-1: CVE-2022-2849: vim: Invalid memory access related to mb_ptr2len()</issue>
<issue tracker="bnc" id="1201133">VUL-1: CVE-2022-2284: vim: out of bounds read in utfc_ptr2len()</issue>
<issue tracker="bnc" id="1201620">SLE-15-SP4-Full-x86_64-GM-Media1 and vim-plugin-tlib-1.27-bp154.2.18.noarch issue</issue>
<issue tracker="bnc" id="1203110">VUL-1: CVE-2022-3099: vim: Use After Free in ex_docmd.c</issue>
<issue tracker="bnc" id="1202421">VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in check_vim9_unlet()</issue>
<issue tracker="bnc" id="1202515">VUL-1: CVE-2022-2845: vim: Buffer Over-read related to display_dollar()</issue>
<issue tracker="bnc" id="1196361">VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference in vim prior to 8.2</issue>
<issue tracker="bnc" id="1193298">VUL-0: CVE-2021-3984: vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow</issue>
<issue tracker="bnc" id="1200270">VUL-1: CVE-2022-1968: vim: use after free in utf_ptr2char</issue>
<issue tracker="bnc" id="1194216">VUL-1: CVE-2021-4193: vim: vulnerable to Out-of-bounds Read</issue>
<issue tracker="bnc" id="1192481">VUL-1: CVE-2021-3927: vim: vim is vulnerable to Heap-based Buffer Overflow</issue>
<issue tracker="bnc" id="1201153">VUL-1: CVE-2022-2207: vim: out of bounds read in ins_bs()</issue>
<issue tracker="bnc" id="1190533">VUL-1: CVE-2021-3778: vim: Heap-based Buffer Overflow in regexp_nfa.c</issue>
<issue tracker="bnc" id="1201249">VUL-0: CVE-2022-2304: vim: stack buffer overflow in spell_dump_compl()</issue>
<issue tracker="bnc" id="1202962">VUL-1: CVE-2022-3037: vim: Use After Free in vim prior to 9.0.0321</issue>
<issue tracker="bnc" id="1199334">VUL-1: CVE-2022-1620: vim: NULL Pointer Dereference in function vim_regexec_string</issue>
<issue tracker="bnc" id="1199655">VUL-1: CVE-2022-1733: vim: Heap-based Buffer Overflow in cindent.c</issue>
<issue tracker="bnc" id="1199331">VUL-1: CVE-2022-1616: vim: Use after free in append_command</issue>
<issue tracker="bnc" id="1201150">VUL-1: CVE-2022-2231: vim: null pointer dereference skipwhite()</issue>
<issue tracker="bnc" id="1199747">VUL-1: CVE-2022-1796: vim: Use After Free in find_pattern_in_path</issue>
<issue tracker="bnc" id="1199693">VUL-1: CVE-2022-1771: vim: stack exhaustion in vim prior to 8.2.</issue>
<issue tracker="bnc" id="1200012">VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim prior to 8.2</issue>
<issue tracker="bnc" id="1176549">[Build 20200914] small-vim removes /usr/bin/vim on upgrades</issue>
<issue tracker="bnc" id="1200903">VUL-1: CVE-2022-2182: vim: Heap-based Buffer Overflow through parse_cmd_address()</issue>
<issue tracker="bnc" id="1195202">VUL-1: CVE-2022-0361: vim: Heap-based Buffer Overflow in vim prior to 8.2.</issue>
<issue tracker="bnc" id="1195126">VUL-1: CVE-2022-0351: vim: uncontrolled recursion in eval7()</issue>
<issue tracker="bnc" id="1193905">VUL-0: CVE-2021-4136: vim: vim is vulnerable to Heap-based Buffer Overflow</issue>
<issue tracker="bnc" id="1202599">VUL-1: CVE-2022-2889: vim: use-after-free in find_var_also_in_script() in evalvars.c</issue>
<issue tracker="bnc" id="1201863">VUL-1: CVE-2022-2522: vim: out of bounds read via nested autocommand</issue>
<issue tracker="bnc" id="1200902">VUL-1: CVE-2022-2183: vim: Out-of-bounds Read through get_lisp_indent()</issue>
<issue tracker="bnc" id="1200010">VUL-1: CVE-2022-1897: vim: Out-of-bounds Write in vim</issue>
<issue tracker="bnc" id="1198596">VUL-0: CVE-2022-1381: vim: global heap buffer overflow in skip_range</issue>
<issue tracker="bnc" id="1203924">VUL-1: CVE-2022-3352: vim: vim: use after free</issue>
<issue tracker="bnc" id="1203796">VUL-1: CVE-2022-3296: vim: stack out of bounds read in ex_finally() in ex_eval.c</issue>
<issue tracker="bnc" id="1203820">VUL-0: CVE-2022-3324: vim: Stack-based Buffer Overflow in prior to 9.0.0598.</issue>
<issue tracker="bnc" id="1201135">VUL-1: CVE-2022-2286: vim: out of bounds read in ins_bytes()</issue>
<issue tracker="bnc" id="1202689">VUL-1: CVE-2022-2946: vim: use after free in function vim_vsnprintf_typval</issue>
<issue tracker="bnc" id="1203272">VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.</issue>
<issue tracker="bnc" id="1199333">VUL-0: CVE-2022-1619: vim: Heap-based Buffer Overflow in function cmdline_erase_chars</issue>
<issue tracker="cve" id="2022-2286"/>
<issue tracker="cve" id="2021-4166"/>
<issue tracker="cve" id="2022-1927"/>
<issue tracker="cve" id="2022-2845"/>
<issue tracker="cve" id="2022-2183"/>
<issue tracker="cve" id="2022-3153"/>
<issue tracker="cve" id="2021-3903"/>
<issue tracker="cve" id="2021-3968"/>
<issue tracker="cve" id="2022-0407"/>
<issue tracker="cve" id="2021-4136"/>
<issue tracker="cve" id="2022-2285"/>
<issue tracker="cve" id="2022-2816"/>
<issue tracker="cve" id="2022-1968"/>
<issue tracker="cve" id="2022-2207"/>
<issue tracker="cve" id="2021-4193"/>
<issue tracker="cve" id="2022-0359"/>
<issue tracker="cve" id="2017-17087"/>
<issue tracker="cve" id="2022-3278"/>
<issue tracker="cve" id="2022-2231"/>
<issue tracker="cve" id="2022-2210"/>
<issue tracker="cve" id="2022-1771"/>
<issue tracker="cve" id="2022-2571"/>
<issue tracker="cve" id="2022-1735"/>
<issue tracker="cve" id="2021-46059"/>
<issue tracker="cve" id="2021-3927"/>
<issue tracker="cve" id="2021-3973"/>
<issue tracker="cve" id="2022-2862"/>
<issue tracker="cve" id="2022-1420"/>
<issue tracker="cve" id="2022-2980"/>
<issue tracker="cve" id="2017-6349"/>
<issue tracker="cve" id="2022-0413"/>
<issue tracker="cve" id="2022-2522"/>
<issue tracker="cve" id="2017-6350"/>
<issue tracker="cve" id="2022-3352"/>
<issue tracker="cve" id="2022-2344"/>
<issue tracker="cve" id="2022-2819"/>
<issue tracker="cve" id="2022-3235"/>
<issue tracker="cve" id="2022-2343"/>
<issue tracker="cve" id="2022-3324"/>
<issue tracker="cve" id="2022-1381"/>
<issue tracker="cve" id="2021-3778"/>
<issue tracker="cve" id="2021-4069"/>
<issue tracker="cve" id="2022-0213"/>
<issue tracker="cve" id="2022-2923"/>
<issue tracker="cve" id="2022-2124"/>
<issue tracker="cve" id="2022-2208"/>
<issue tracker="cve" id="2022-0318"/>
<issue tracker="cve" id="2022-3099"/>
<issue tracker="cve" id="2022-3134"/>
<issue tracker="cve" id="2016-1248"/>
<issue tracker="cve" id="2009-0316"/>
<issue tracker="cve" id="2022-1619"/>
<issue tracker="cve" id="2022-2889"/>
<issue tracker="cve" id="2022-2874"/>
<issue tracker="cve" id="2022-1851"/>
<issue tracker="cve" id="2022-1898"/>
<issue tracker="cve" id="2022-2287"/>
<issue tracker="cve" id="2021-4192"/>
<issue tracker="cve" id="2022-2206"/>
<issue tracker="cve" id="2022-1616"/>
<issue tracker="cve" id="2022-2598"/>
<issue tracker="cve" id="2022-2175"/>
<issue tracker="cve" id="2022-0261"/>
<issue tracker="cve" id="2021-3974"/>
<issue tracker="cve" id="2022-2126"/>
<issue tracker="cve" id="2021-4019"/>
<issue tracker="cve" id="2022-2982"/>
<issue tracker="cve" id="2022-2817"/>
<issue tracker="cve" id="2022-2581"/>
<issue tracker="cve" id="2022-3705"/>
<issue tracker="cve" id="2017-5953"/>
<issue tracker="cve" id="2022-2125"/>
<issue tracker="cve" id="2022-3297"/>
<issue tracker="cve" id="2022-0351"/>
<issue tracker="cve" id="2022-0392"/>
<issue tracker="cve" id="2022-3037"/>
<issue tracker="cve" id="2022-2264"/>
<issue tracker="cve" id="2022-2284"/>
<issue tracker="cve" id="2022-2849"/>
<issue tracker="cve" id="2022-3296"/>
<issue tracker="cve" id="2022-2345"/>
<issue tracker="cve" id="2022-1796"/>
<issue tracker="cve" id="2022-3016"/>
<issue tracker="cve" id="2021-3928"/>
<issue tracker="cve" id="2022-1897"/>
<issue tracker="cve" id="2022-2946"/>
<issue tracker="cve" id="2021-3984"/>
<issue tracker="cve" id="2022-0319"/>
<issue tracker="cve" id="2022-2129"/>
<issue tracker="cve" id="2022-1720"/>
<issue tracker="cve" id="2022-0128"/>
<issue tracker="cve" id="2021-3872"/>
<issue tracker="cve" id="2022-0361"/>
<issue tracker="cve" id="2022-1733"/>
<issue tracker="cve" id="2022-3234"/>
<issue tracker="cve" id="2022-2304"/>
<issue tracker="cve" id="2022-2182"/>
<issue tracker="cve" id="2022-0696"/>
<issue tracker="cve" id="2022-2257"/>
<issue tracker="cve" id="2021-3875"/>
<issue tracker="cve" id="2021-3796"/>
<issue tracker="cve" id="2022-2580"/>
<issue tracker="cve" id="2022-1620"/>
<issue tracker="cve" id="2022-1785"/>
<packager>bzoltan1</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for vim</summary>
<description>This update for vim fixes the following issues:
Updated to version 9.0.0814:
* Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow
* Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483.
* Fixing bsc#1203509 VUL-1: CVE-2022-3235: vim: Use After Free in GitHub prior to 9.0.0490.
* Fixing bsc#1203820 VUL-0: CVE-2022-3324: vim: Stack-based Buffer Overflow in prior to 9.0.0598.
* Fixing bsc#1204779 VUL-0: CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c
* Fixing bsc#1203152 VUL-1: CVE-2022-2982: vim: use after free in qf_fill_buffer()
* Fixing bsc#1203796 VUL-1: CVE-2022-3296: vim: stack out of bounds read in ex_finally() in ex_eval.c
* Fixing bsc#1203797 VUL-1: CVE-2022-3297: vim: use-after-free in process_next_cpt_value() at insexpand.c
* Fixing bsc#1203110 VUL-1: CVE-2022-3099: vim: Use After Free in ex_docmd.c
* Fixing bsc#1203194 VUL-1: CVE-2022-3134: vim: use after free in do_tag()
* Fixing bsc#1203272 VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.
* Fixing bsc#1203799 VUL-1: CVE-2022-3278: vim: NULL pointer dereference in eval_next_non_blank() in eval.c
* Fixing bsc#1203924 VUL-1: CVE-2022-3352: vim: vim: use after free
* Fixing bsc#1203155 VUL-1: CVE-2022-2980: vim: null pointer dereference in do_mouse()
* Fixing bsc#1202962 VUL-1: CVE-2022-3037: vim: Use After Free in vim prior to 9.0.0321
* Fixing bsc#1200884 Vim: Error on startup
* Fixing bsc#1200902 VUL-0: CVE-2022-2183: vim: Out-of-bounds Read through get_lisp_indent() Mon 13:32
* Fixing bsc#1200903 VUL-0: CVE-2022-2182: vim: Heap-based Buffer Overflow through parse_cmd_address() Tue 08:37
* Fixing bsc#1200904 VUL-0: CVE-2022-2175: vim: Buffer Over-read through cmdline_insert_reg() Tue 08:37
* Fixing bsc#1201249 VUL-0: CVE-2022-2304: vim: stack buffer overflow in spell_dump_compl()
* Fixing bsc#1201356 VUL-1: CVE-2022-2343: vim: Heap-based Buffer Overflow in GitHub repository vim prior to 9.0.0044
* Fixing bsc#1201359 VUL-1: CVE-2022-2344: vim: Another Heap-based Buffer Overflow vim prior to 9.0.0045
* Fixing bsc#1201363 VUL-1: CVE-2022-2345: vim: Use After Free in GitHub repository vim prior to 9.0.0046.
* Fixing bsc#1201620 vim: SLE-15-SP4-Full-x86_64-GM-Media1 and vim-plugin-tlib-1.27-bp154.2.18.noarch issue
* Fixing bsc#1202414 VUL-1: CVE-2022-2819: vim: Heap-based Buffer Overflow in compile_lock_unlock()
* Fixing bsc#1202552 VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference in generate_loadvar()
* Fixing bsc#1200270 VUL-1: CVE-2022-1968: vim: use after free in utf_ptr2char
* Fixing bsc#1200697 VUL-1: CVE-2022-2124: vim: out of bounds read in current_quote()
* Fixing bsc#1200698 VUL-1: CVE-2022-2125: vim: out of bounds read in get_lisp_indent()
* Fixing bsc#1200700 VUL-1: CVE-2022-2126: vim: out of bounds read in suggest_trie_walk()
* Fixing bsc#1200701 VUL-1: CVE-2022-2129: vim: out of bounds write in vim_regsub_both()
* Fixing bsc#1200732 VUL-1: CVE-2022-1720: vim: out of bounds read in grab_file_name()
* Fixing bsc#1201132 VUL-1: CVE-2022-2264: vim: out of bounds read in inc()
* Fixing bsc#1201133 VUL-1: CVE-2022-2284: vim: out of bounds read in utfc_ptr2len()
* Fixing bsc#1201134 VUL-1: CVE-2022-2285: vim: negative size passed to memmove() due to integer overflow
* Fixing bsc#1201135 VUL-1: CVE-2022-2286: vim: out of bounds read in ins_bytes()
* Fixing bsc#1201136 VUL-1: CVE-2022-2287: vim: out of bounds read in suggest_trie_walk()
* Fixing bsc#1201150 VUL-1: CVE-2022-2231: vim: null pointer dereference skipwhite()
* Fixing bsc#1201151 VUL-1: CVE-2022-2210: vim: out of bounds read in ml_append_int()
* Fixing bsc#1201152 VUL-1: CVE-2022-2208: vim: null pointer dereference in diff_check()
* Fixing bsc#1201153 VUL-1: CVE-2022-2207: vim: out of bounds read in ins_bs()
* Fixing bsc#1201154 VUL-1: CVE-2022-2257: vim: out of bounds read in msg_outtrans_special()
* Fixing bsc#1201155 VUL-1: CVE-2022-2206: vim: out of bounds read in msg_outtrans_attr()
* Fixing bsc#1201863 VUL-1: CVE-2022-2522: vim: out of bounds read via nested autocommand
* Fixing bsc#1202046 VUL-1: CVE-2022-2571: vim: Heap-based Buffer Overflow related to ins_comp_get_next_word_or_line()
* Fixing bsc#1202049 VUL-1: CVE-2022-2580: vim: Heap-based Buffer Overflow related to eval_string()
* Fixing bsc#1202050 VUL-1: CVE-2022-2581: vim: Out-of-bounds Read related to cstrchr()
* Fixing bsc#1202051 VUL-1: CVE-2022-2598: vim: Undefined Behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput()
* Fixing bsc#1202420 VUL-1: CVE-2022-2817: vim: Use After Free in f_assert_fails()
* Fixing bsc#1202421 VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in check_vim9_unlet()
* Fixing bsc#1202511 VUL-1: CVE-2022-2862: vim: use-after-free in compile_nested_function()
* Fixing bsc#1202512 VUL-1: CVE-2022-2849: vim: Invalid memory access related to mb_ptr2len()
* Fixing bsc#1202515 VUL-1: CVE-2022-2845: vim: Buffer Over-read related to display_dollar()
* Fixing bsc#1202599 VUL-1: CVE-2022-2889: vim: use-after-free in find_var_also_in_script() in evalvars.c
* Fixing bsc#1202687 VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240
* Fixing bsc#1202689 VUL-1: CVE-2022-2946: vim: use after free in function vim_vsnprintf_typval
* Fixing bsc#1202862 VUL-1: CVE-2022-3016: vim: Use After Free in vim prior to 9.0.0285 Mon 12:00
* Fixing bsc#1191770 VUL-0: CVE-2021-3875: vim: heap-based buffer overflow
* Fixing bsc#1192167 VUL-0: CVE-2021-3903: vim: heap-based buffer overflow
* Fixing bsc#1192902 VUL-0: CVE-2021-3968: vim: vim is vulnerable to
Heap-based Buffer Overflow
* Fixing bsc#1192903 VUL-0: CVE-2021-3973: vim: vim is vulnerable to
Heap-based Buffer Overflow
* Fixing bsc#1192904 VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use
After Free
* Fixing bsc#1193466 VUL-1: CVE-2021-4069: vim: use-after-free in ex_open()
in src/ex_docmd.c
* Fixing bsc#1193905 VUL-0: CVE-2021-4136: vim: vim is vulnerable to
Heap-based Buffer Overflow
* Fixing bsc#1194093 VUL-1: CVE-2021-4166: vim: vim is vulnerable to
Out-of-bounds Read
* Fixing bsc#1194216 VUL-1: CVE-2021-4193: vim: vulnerable to
Out-of-bounds Read
* Fixing bsc#1194217 VUL-0: CVE-2021-4192: vim: vulnerable to Use After Free
* Fixing bsc#1194872 VUL-0: CVE-2022-0261: vim: Heap-based Buffer Overflow
in vim prior to 8.2.
* Fixing bsc#1194885 VUL-0: CVE-2022-0213: vim: vim is vulnerable to
Heap-based Buffer Overflow
* Fixing bsc#1195004 VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in
vim prior to 8.2.
* Fixing bsc#1195203 VUL-0: CVE-2022-0359: vim: heap-based buffer overflow in
init_ccline() in ex_getln.c
* Fixing bsc#1195354 VUL-0: CVE-2022-0407: vim: Heap-based Buffer Overflow in
Conda vim prior to 8.2.
* Fixing bsc#1198596 VUL-0: CVE-2022-1381: vim: global heap buffer overflow
in skip_range
* Fixing bsc#1199331 VUL-0: CVE-2022-1616: vim: Use after free in
append_command
* Fixing bsc#1199333 VUL-0: CVE-2022-1619: vim: Heap-based Buffer Overflow in
function cmdline_erase_chars
* Fixing bsc#1199334 VUL-0: CVE-2022-1620: vim: NULL Pointer Dereference in
function vim_regexec_string
* Fixing bsc#1199747 VUL-0: CVE-2022-1796: vim: Use After in
find_pattern_in_path
* Fixing bsc#1200010 VUL-0: CVE-2022-1897: vim: Out-of-bounds Write in vim
* Fixing bsc#1200011 VUL-0: CVE-2022-1898: vim: Use After Free in vim prior
to 8.2
* Fixing bsc#1200012 VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim prior
to 8.2
* Fixing bsc#1070955 VUL-1: CVE-2017-17087: vim: Sets the group ownership of a
.swp file to the editor's primary group, which allows local users to obtain
sensitive information
* Fixing bsc#1194388 VUL-1: CVE-2022-0128: vim: vim is vulnerable to
Out-of-bounds Read
* Fixing bsc#1195332 VUL-1: CVE-2022-0392: vim: Heap-based Buffer Overflow
in vim prior to 8.2
* Fixing bsc#1196361 VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference in
vim prior to 8.2
* Fixing bsc#1198748 VUL-1: CVE-2022-1420: vim: Out-of-range Pointer Offset
* Fixing bsc#1199651 VUL-1: CVE-2022-1735: vim: heap buffer overflow
* Fixing bsc#1199655 VUL-1: CVE-2022-1733: vim: Heap-based Buffer Overflow in
cindent.c
* Fixing bsc#1199693 VUL-1: CVE-2022-1771: vim: stack exhaustion in vim prior
to 8.2.
* Fixing bsc#1199745 VUL-1: CVE-2022-1785: vim: Out-of-bounds Write
* Fixing bsc#1199936 VUL-1: CVE-2022-1851: vim: out of bounds read
* Fixing bsc#1195004 - (CVE-2022-0318) VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2.
* Fixing bsc#1190570 CVE-2021-3796: vim: use-after-free in nv_replace() in normal.c
* Fixing bsc#1191893 CVE-2021-3872: vim: heap-based buffer overflow in win_redr_status() drawscreen.c
* Fixing bsc#1192481 CVE-2021-3927: vim: vim is vulnerable to Heap-based Buffer Overflow
* Fixing bsc#1192478 CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow
* Fixing bsc#1193294 CVE-2021-4019: vim: vim is vulnerable to Heap-based Buffer Overflow
* Fixing bsc#1193298 CVE-2021-3984: vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow
* Fixing bsc#1190533 CVE-2021-3778: vim: Heap-based Buffer Overflow in regexp_nfa.c
* Fixing bsc#1194216 CVE-2021-4193: vim: vulnerable to Out-of-bounds Read
* Fixing bsc#1194556 CVE-2021-46059: vim: A Pointer Dereference vulnerability
exists in Vim 8.2.3883 via the vim_regexec_multi function at regexp.c, which causes a denial of service.
* Fixing bsc#1195066 CVE-2022-0319: vim: Out-of-bounds Read in vim/vim prior to 8.2.
* Fixing bsc#1195126 CVE-2022-0351: vim: uncontrolled recursion in eval7()
* Fixing bsc#1195202 CVE-2022-0361: vim: Heap-based Buffer Overflow in vim prior to 8.2.
* Fixing bsc#1195356 CVE-2022-0413: vim: use after free in src/ex_cmds.c
</description>
</patchinfo>