vim (2:7.3.429-2ubuntu2.3) precise-security; urgency=medium
* SECURITY UPDATE: Denial of service
- debian/patches/upstream/patch-8.0.070*.patch: check the event
event for being out of range in src/fileio.c; do not set cmdbuff to
NULL, make it empty in src/ex_getln.c; set w_s pointer if w_buffer
was NULL in src/ex_cmds.c.
- CVE-2017-11109
* SECURITY UPDATE: Buffer overflow
- debian/patches/upstream/patch-8.0.0322-*.patch: check for an invalid
length in src/spell.c.
- CVE-2017-5953
* SECURITY UPDATE: Integer overflow
- debian/patches/upstream/patch-8.0.0377*.patch: check if allocated size
is not too big in src/undo.c.
- CVE-2017-6349
* SECURITY UPDATE: Buffer overflow
- debian/patches/upstream/patch-8.0.0378*.patch: check if allocated size
is not too big in src/undo.c.
- CVE-2017-6350
Date: 2020-03-18 20:01:15.850467+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Steve Langasek <steve.langa...@canonical.com>
https://launchpad.net/ubuntu/+source/vim/2:7.3.429-2ubuntu2.3
Sorry, changesfile not available.
--
Precise-changes mailing list
Precise-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/precise-changes