File _patchinfo of Package patchinfo.4063

<patchinfo incident="4063">
  <issue id="1018870" tracker="bnc">Problematic VIM regular expression handling for Ansible YAML files.</issue>
  <issue id="1024724" tracker="bnc">VUL-1: CVE-2017-5953: vim: crafted spellfile can cause buffer overflow</issue>
  <issue id="1027053" tracker="bnc">VUL-1: CVE-2017-6350: vim: An integer overflow at an unserialize_uep memory allocation site wouldoccur for vim before patch</issue>
  <issue id="1027057" tracker="bnc"></issue>
  <issue id="2017-5953" tracker="cve" />
  <issue id="2017-6350" tracker="cve" />
  <issue id="2017-6349" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>namtrac</packager>
  <description>
This update for vim fixes the following issues:

Security issues fixed:

- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
- CVE-2017-6350: Fixed a possible overflow when reading a corrupted undo file (bsc#1027053)
- CVE-2017-6349: Fixed a possible overflow when reading a corrupted undo file (bsc#1027057)


Non security issues fixed:

- Speed up YAML syntax highlighting (bsc#1018870)

</description>
  <summary>Security update for vim</summary>
</patchinfo>
openSUSE Build Service is sponsored by