File _patchinfo of Package patchinfo.30283

<patchinfo incident="30283">
  <issue tracker="bnc" id="1211461">vim "eats" first character from prompt in xterm - ref:_00D1igLOd._5005qQX5RA:ref</issue>
  <issue tracker="bnc" id="1210996">VUL-0: CVE-2023-2426: vim: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 9.0.1499.</issue>
  <issue tracker="bnc" id="1211256">VUL-1: CVE-2023-2609: vim: NULL Pointer Dereference prior to 9.0.1531</issue>
  <issue tracker="bnc" id="1211257">VUL-1: CVE-2023-2610: vim: Integer Overflow or Wraparound prior to 9.0.1532</issue>
  <issue tracker="cve" id="2023-2609"/>
  <issue tracker="cve" id="2023-2426"/>
  <issue tracker="cve" id="2023-2610"/>
  <packager>bzoltan1</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for vim</summary>
  <description>This update for vim fixes the following issues:

Updated to version 9.0 with patch level 1572.

- CVE-2023-2426: Fixed Out-of-range Pointer Offset use (bsc#1210996).
- CVE-2023-2609: Fixed NULL Pointer Dereference (bsc#1211256).
- CVE-2023-2610: Fixed nteger Overflow or Wraparound (bsc#1211257).
</description>
</patchinfo>
openSUSE Build Service is sponsored by