Accepted:
OK: vim_6.4.orig.tar.gz
OK: vim_6.4-006+2ubuntu6.1.diff.gz
OK: vim_6.4-006+2ubuntu6.1.dsc
-> Component: main Section: editors
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 26 Aug 2007 12:06:23 +0100
Source: vim
Binary: vim-common vim-gnome vim-doc vim-runtime vim vim-gtk vim-perl vim-ruby
vim-gui-common vim-tiny vim-python vim-tcl
Architecture: source
Version: 1:6.4-006+2ubuntu6.1
Distribution: dapper-security
Urgency: low
Maintainer: Debian VIM Maintainers <[EMAIL PROTECTED]>
Changed-By: Neil McGovern <[EMAIL PROTECTED]>
Description:
vim - Vi IMproved - enhanced vi editor
vim-common - Vi IMproved - Common files
vim-doc - Vi IMproved - HTML documentation
vim-gnome - Vi IMproved - enhanced vi editor - with GNOME2 GUI
vim-gtk - Vi IMproved - enhanced vi editor - with GTK2 GUI
vim-gui-common - Vi IMproved - Common GUI files
vim-perl - Vi IMproved - enhanced vi editor - with Perl support
vim-python - Vi IMproved - enhanced vi editor - with Python support
vim-ruby - Vi IMproved - enhanced vi editor - with Ruby support
vim-runtime - Vi IMproved - Runtime files
vim-tcl - Vi IMproved - enhanced vi editor - with TCL support
vim-tiny - Vi IMproved - enhanced vi editor - compact version
Changes:
vim (1:6.4-006+2ubuntu6.1) dapper-security; urgency=low
.
* SECURITY UPDATE: Format string vulnerability allows user-assisted remote
attackers to execute arbitrary code.
* Added 'patches/801_CVE-2007-2953': Use puts() instead of
fprintf(). Patch from upstream, backported.
* References
CVE-2007-2953
Files:
bc62b8688b56a38e6ba0fc60f50f0174 1323 editors optional
vim_6.4-006+2ubuntu6.1.dsc
4e1ffc35c25e3abff107ae6a602e7f71 182627 editors optional
vim_6.4-006+2ubuntu6.1.diff.gz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFG1FHiH/9LqRcGPm0RAkEpAJ4ycTJQV71hrtgNC0mNIEdZ3unuIgCcClyD
Oc5tjZ+zXSNtq8hWLMX/obU=
=maUc
-----END PGP SIGNATURE-----
--
dapper-changes mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/dapper-changes