Mageia 2020-0151: vim security update

    Date 31 Mar 2020
    581
    Posted By LinuxSecurity Advisories
    It was discovered that the autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory (CVE-2019-20079). References: - https://bugs.mageia.org/show_bug.cgi?id=26380
    MGASA-2020-0151 - Updated vim packages fix security vulnerability
    
    Publication date: 01 Apr 2020
    URL: https://advisories.mageia.org/MGASA-2020-0151.html
    Type: security
    Affected Mageia releases: 7
    CVE: CVE-2019-20079
    
    It was discovered that the autocmd feature in window.c in Vim before
    8.1.2136 accesses freed memory (CVE-2019-20079).
    
    References:
    - https://bugs.mageia.org/show_bug.cgi?id=26380
    - https://usn.ubuntu.com/4309-1/
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20079
    
    SRPMS:
    - 7/core/vim-8.1.2136-1.mga7
    

    LinuxSecurity Poll

    Do you agree with Linus Torvalds' decision to reject the controversial patch mitigating the Snoop attack on Intel CPUs?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/28-do-you-agree-with-linus-torvalds-decision-to-reject-the-controversial-patch-mitigating-the-snoop-attack-on-intel-cpus?task=poll.vote&format=json
    28
    radio
    [{"id":"100","title":"Yes - this was undoubtedly the right decision.","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"101","title":"Not sure...","votes":"1","type":"x","order":"2","pct":100,"resources":[]},{"id":"102","title":"No - he made a big mistake here.","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.