File _patchinfo of Package patchinfo.37568
<patchinfo incident="37568">
<issue tracker="bnc" id="1230078">VUL-0: CVE-2024-45306: vim: heap-buffer-overflow in Vim</issue>
<issue tracker="bnc" id="1236151">VUL-0: CVE-2025-24014: vim: segmentation fault in win_line() in Vim < 9.1.1043</issue>
<issue tracker="bnc" id="1237137">VUL-0: CVE-2025-1215: vim: manipulation of the argument --log leads to memory corruption</issue>
<issue tracker="bnc" id="1235695">VUL-0: CVE-2025-22134: vim: heap-buffer-overflow in Vim < 9.1.1003</issue>
<issue tracker="bnc" id="1229685">VUL-0: CVE-2024-43790: vim: Out of bounds read when performing a search command</issue>
<issue tracker="bnc" id="1229822">VUL-0: CVE-2024-43802: vim: heap-buffer-overflow in ins_typebuf()</issue>
<issue tracker="cve" id="2025-1215"/>
<issue tracker="cve" id="2024-45306"/>
<issue tracker="cve" id="2024-43790"/>
<issue tracker="cve" id="2025-24014"/>
<issue tracker="cve" id="2024-43802"/>
<issue tracker="cve" id="2025-22134"/>
<packager>mschreiner</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for vim</summary>
<description>This update for vim fixes the following issues:
Update to version 9.1.1101:
- CVE-2024-43790: possible out-of-bounds read when performing a search command (bsc#1229685).
- CVE-2024-43802: heap buffer overflow due to incorrect flushing of the typeahead buffer (bsc#1229822).
- CVE-2024-45306: heap buffer overflow when cursor position is invalid (bsc#1230078).
- CVE-2025-22134: heap buffer overflow when switching to other buffers using the :all command with active visual mode
(bsc#1235695).
- CVE-2025-24014: NULL pointer dereference may lead to segmentation fault when in silent Ex mode (bsc#1236151).
- CVE-2025-1215: memory corruption when manipulating the --log argument (bsc#1237137).
</description>
</patchinfo>