vim (2:7.4.1689-3ubuntu1.3) xenial-security; urgency=medium
* SECURITY UPDATE: Arbitrary code execution
- debian/patches/CVE-2019-12735.patch: disallow
sourcing a file in the sandbox in src/getchar.c
- CVE-2019-12735
* SECURITY UPDATE: Buffer overflow
- debian/patches/CVE-2017-5953.patch: check for an
invalid length in order to avoid a overflow in
src/spell.c.
- CVE-2017-5953
Date: 2019-06-11 15:01:13.762061+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Ubuntu Archive Robot
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/vim/2:7.4.1689-3ubuntu1.3
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes