File _patchinfo of Package patchinfo.30283
<patchinfo incident="30283"> <issue tracker="bnc" id="1211461">vim "eats" first character from prompt in xterm - ref:_00D1igLOd._5005qQX5RA:ref</issue> <issue tracker="bnc" id="1210996">VUL-0: CVE-2023-2426: vim: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 9.0.1499.</issue> <issue tracker="bnc" id="1211256">VUL-1: CVE-2023-2609: vim: NULL Pointer Dereference prior to 9.0.1531</issue> <issue tracker="bnc" id="1211257">VUL-1: CVE-2023-2610: vim: Integer Overflow or Wraparound prior to 9.0.1532</issue> <issue tracker="cve" id="2023-2609"/> <issue tracker="cve" id="2023-2426"/> <issue tracker="cve" id="2023-2610"/> <packager>bzoltan1</packager> <rating>important</rating> <category>security</category> <summary>Security update for vim</summary> <description>This update for vim fixes the following issues: Updated to version 9.0 with patch level 1572. - CVE-2023-2426: Fixed Out-of-range Pointer Offset use (bsc#1210996). - CVE-2023-2609: Fixed NULL Pointer Dereference (bsc#1211256). - CVE-2023-2610: Fixed nteger Overflow or Wraparound (bsc#1211257). </description> </patchinfo>