[ubuntu/xenial-security] vim 2:7.4.1689-3ubuntu1.4 (Accepted)
Leonidas S. Barbosa
leo.barbosa at canonical.com
Mon Mar 23 14:38:46 UTC 2020
vim (2:7.4.1689-3ubuntu1.4) xenial-security; urgency=medium
* SECURITY UPDATE: Denial of service
- debian/patches/upstream/patch-8.0.070*.patch: check the event
event for being out of range in src/fileio.c; set w_s pointer if w_buffer
was NULL in src/ex_cmds.c.
- CVE-2017-11109
* SECURITY UPDATE: Integer overflow
- debian/patches/upstream/patch-8.0.0377*.patch: check if allocated size
is not too big in src/undo.c.
- CVE-2017-6349
* SECURITY UPDATE: Buffer overflow
- debian/patches/upstream/patch-8.0.0378*.patch: check if allocated size
is not too big in src/undo.c.
- CVE-2017-6350
Date: 2020-03-18 20:02:39.669137+00:00
Changed-By: leo.barbosa at canonical.com (Leonidas S. Barbosa)
https://launchpad.net/ubuntu/+source/vim/2:7.4.1689-3ubuntu1.4
-------------- next part --------------
Sorry, changesfile not available.
More information about the Xenial-changes
mailing list