[ubuntu/xenial-security] vim 2:7.4.1689-3ubuntu1.4 (Accepted)

Leonidas S. Barbosa leo.barbosa at canonical.com
Mon Mar 23 14:38:46 UTC 2020


vim (2:7.4.1689-3ubuntu1.4) xenial-security; urgency=medium

  * SECURITY UPDATE: Denial of service
    - debian/patches/upstream/patch-8.0.070*.patch: check the event
      event for being out of range in src/fileio.c; set w_s pointer if w_buffer
      was NULL in src/ex_cmds.c.
    - CVE-2017-11109
  * SECURITY UPDATE: Integer overflow
    - debian/patches/upstream/patch-8.0.0377*.patch: check if allocated size
      is not too big in src/undo.c.
    - CVE-2017-6349
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/upstream/patch-8.0.0378*.patch: check if allocated size
      is not too big in src/undo.c.
    - CVE-2017-6350

Date: 2020-03-18 20:02:39.669137+00:00
Changed-By: leo.barbosa at canonical.com (Leonidas S. Barbosa)
https://launchpad.net/ubuntu/+source/vim/2:7.4.1689-3ubuntu1.4
-------------- next part --------------
Sorry, changesfile not available.


More information about the Xenial-changes mailing list