Bugs fixes in "vim"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
Launchpad | 2064687 | Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current | 2024-05-31 |
Launchpad | 2064687 | Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current | 2024-05-31 |
Launchpad | 2064687 | Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current | 2024-05-03 |
Launchpad | 2064687 | Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current | 2024-05-03 |
Launchpad | 2064687 | Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current | 2024-05-03 |
Launchpad | 2064687 | Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current | 2024-05-03 |
Launchpad | 2064687 | Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current | 2024-05-03 |
Launchpad | 2064687 | Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current | 2024-05-03 |
CVE | CVE-2024-22667 | Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down | 2024-03-18 |
CVE | CVE-2024-22667 | Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down | 2024-03-18 |
CVE | CVE-2024-22667 | Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down | 2024-03-18 |
CVE | CVE-2024-22667 | Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down | 2024-03-18 |
CVE | CVE-2024-22667 | Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down | 2024-03-18 |
CVE | CVE-2024-22667 | Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down | 2024-03-18 |
CVE | CVE-2024-22667 | Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down | 2024-03-18 |
CVE | CVE-2024-22667 | Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down | 2024-03-18 |
CVE | CVE-2023-48237 | Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it ma | 2023-12-14 |
CVE | CVE-2023-48236 | Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is | 2023-12-14 |
CVE | CVE-2023-48235 | Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens | 2023-12-14 |
CVE | CVE-2023-48234 | Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is | 2023-12-14 |
About
-
Send Feedback to @ubuntu_updates