On Wed, Sep 15, 2021 at 06:23:14AM +0200, Salvatore Bonaccorso wrote:
> Hi James,
>
> On Tue, Sep 14, 2021 at 09:06:22PM -0400, James McCoy wrote:
> > On Sat, Sep 11, 2021 at 09:26:04AM +0200, Salvatore Bonaccorso wrote:
> > > The following vulnerability was published for vim.
> > >
> > >
Hi James,
On Tue, Sep 14, 2021 at 09:06:22PM -0400, James McCoy wrote:
> On Sat, Sep 11, 2021 at 09:26:04AM +0200, Salvatore Bonaccorso wrote:
> > The following vulnerability was published for vim.
> >
> > CVE-2021-3770[0]:
> > | vim is vulnerable to Heap-based Buffer Overflow
> >
> > The fix
On Sat, Sep 11, 2021 at 09:26:04AM +0200, Salvatore Bonaccorso wrote:
> The following vulnerability was published for vim.
>
> CVE-2021-3770[0]:
> | vim is vulnerable to Heap-based Buffer Overflow
>
> The fix is at [1] but needed a followup [2].
Does this need to go through bullseye-security or
Source: vim
Version: 2:8.2.2434-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for vim.
CVE-2021-3770[0]:
| vim is vulnerable to Heap-based Buffer Overflow
The fix is at [1] but needed a
4 matches
Mail list logo