File _patchinfo of Package patchinfo.4063
<patchinfo incident="4063">
<issue id="1018870" tracker="bnc">Problematic VIM regular expression handling for Ansible YAML files.</issue>
<issue id="1024724" tracker="bnc">VUL-1: CVE-2017-5953: vim: crafted spellfile can cause buffer overflow</issue>
<issue id="1027053" tracker="bnc">VUL-1: CVE-2017-6350: vim: An integer overflow at an unserialize_uep memory allocation site wouldoccur for vim before patch</issue>
<issue id="1027057" tracker="bnc"></issue>
<issue id="2017-5953" tracker="cve" />
<issue id="2017-6350" tracker="cve" />
<issue id="2017-6349" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>namtrac</packager>
<description>
This update for vim fixes the following issues:
Security issues fixed:
- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
- CVE-2017-6350: Fixed a possible overflow when reading a corrupted undo file (bsc#1027053)
- CVE-2017-6349: Fixed a possible overflow when reading a corrupted undo file (bsc#1027057)
Non security issues fixed:
- Speed up YAML syntax highlighting (bsc#1018870)
</description>
<summary>Security update for vim</summary>
</patchinfo>