Change logs for vim source package in Bionic

  • vim (2:8.0.1453-1ubuntu1.13) bionic-security; urgency=medium
    
      * SECURITY UPDATE: use-after-free when matching inside a visual selection
        - debian/patches/CVE-2021-4192.patch: get the line again after getvvcol().
        - CVE-2021-4192
      * SECURITY UPDATE: out-of-bounds read when processing data in visual mode
        - debian/patches/CVE-2021-4193.patch: check for valid column in getvcol().
        - CVE-2021-4193
      * SECURITY UPDATE: heap buffer overflow when processing long file names
        - debian/patches/CVE-2022-0213.patch: check length when appending a space.
        - CVE-2022-0213
      * SECURITY UPDATE: heap-based buffer overflow when performing a block insert
        - debian/patches/CVE-2022-0261.patch: handle invalid byte better. Fix
          inserting the wrong text.
        - debian/patches/CVE-2022-0318-1.patch: for block insert only use the
          offset for correcting the length.
        - debian/patches/CVE-2022-0318-2.patch: adjust the expected output for
          utf8 block insert test.
        - CVE-2022-0261
        - CVE-2022-0318
      * SECURITY UPDATE: out-of-bounds read when exchanging windows in visual mode
        - debian/patches/CVE-2022-0319.patch: correct end of Visual area when
          entering another buffer.
        - CVE-2022-0319
      * SECURITY UPDATE: stack pointer corruption when parsing too many brackets
        in expression
        - debian/patches/CVE-2022-0351.patch: limit recursion to 1000.
        - CVE-2022-0351
      * SECURITY UPDATE: illegal memory access when processing large indent in ex
        mode
        - debian/patches/CVE-2022-0359.patch: allocate enough memory.
        - CVE-2022-0359
      * SECURITY UPDATE: illegal memory access when copying lines in visual mode
        - debian/patches/CVE-2022-0361.patch: adjust the Visual position after
          copying lines.
        - CVE-2022-0361
      * SECURITY UPDATE: illegal memory access when undo makes visual area invalid
        in visual mode
        - debian/patches/CVE-2022-0368.patch: correct the Visual area after undo.
        - CVE-2022-0368
      * SECURITY UPDATE: stack corruption when looking for spelling suggestions
        - debian/patches/CVE-2022-0408.patch: prevent the depth increased too
          much. Add a five second time limit to finding suggestions.
        - CVE-2022-0408
      * SECURITY UPDATE: use of freed memory when managing buffers
        - debian/patches/CVE-2022-0443.patch: do not use wiped out buffer.
        - CVE-2022-0443
      * SECURITY UPDATE: heap buffer overflow when processing vim buffers
        - debian/patches/CVE-2022-0554.patch: when deleting the current buffer to
          not pick a quickfix buffer as the new current buffer.
        - CVE-2022-0554
      * SECURITY UPDATE: heap buffer overflow when repeatedly using :retab
        - debian/patches/CVE-2022-0572.patch: bail out when the line is getting
          too long.
        - CVE-2022-0572
      * SECURITY UPDATE: out-of-range pointer offset when using special multi-byte
        character
        - debian/patches/CVE-2022-0685.patch: don't use isalpha() for an arbitrary
          character.
        - CVE-2022-0685
      * SECURITY UPDATE: heap buffer overflow when processing anomalous
        'vartabstop' value
        - debian/patches/CVE-2022-0714.patch: check for running into the end of
          the line.
        - CVE-2022-0714
      * SECURITY UPDATE: out-of-range pointer offset when processing specific
        regexp pattern and string
        - debian/patches/CVE-2022-0729.patch: stop at the start of the string.
        - CVE-2022-0729
      * SECURITY UPDATE: heap-based buffer overflow
        - debian/patches/CVE-2022-2207.patch: adds a check to see if the cursor
          column is great than zero.
        - CVE-2022-2207
    
     -- Nishit Majithia <email address hidden>  Tue, 18 Apr 2023 14:50:34 +0530
  • vim (2:8.0.1453-1ubuntu1.12) bionic-security; urgency=medium
    
      * SECURITY UPDATE: use after free
        - debian/patches/CVE-2022-0413.patch: make a copy of the substitute pattern
          that starts with "\=" in do_sub() in src/ex_cmds.c and free it at the end
          of the method and add test case Test_using_old_sub in
          src/testdir/test_CVE.vim.
        - debian/patches/CVE-2022-1796.patch: make a copy of the pattern to search
          for as it could get freed in do_window() in src/window.c and add test
          case Test_define_search in src/testdir/test_CVE.vim.
        - debian/patches/CVE-2022-1898.patch: make a copy of the string as it could
          get freed in nv_brackets() in src/normal.c, and add a test inside the
          Test_define_search test case in src/testdir/test_CVE.vim.
        - debian/patches/CVE-2022-1968.patch: mitigates the potential for a use
          after free scenario by making a copy of a buffer to use for future
          reference
        - debian/patches/CVE-2022-2946.patch: using freed memory when 'tagfunc'
          deletes the buffer
        - CVE-2022-0413
        - CVE-2022-1796
        - CVE-2022-1898
        - CVE-2022-1968
        - CVE-2022-2946
      * SECURITY UPDATE: buffer over-read
        - debian/patches/CVE-2022-1629.patch: add a check for null after a
          backslash in find_next_quote() in src/search.c and add test case
          Test_string_html_objects in src/testdir/test_CVE.vim.
        - debian/patches/CVE-2022-1720.patch: reading past end of line with "gf" in
          Visual block mode
        - debian/patches/CVE-2022-1733.patch: add a check for null when checking
          for trailing ' in skip_string() in src/misc1.c and add test case
          Test_cindent_check_funcdecl in src/testdir/test_CVE.vim.
        - debian/patches/CVE-2022-1735.patch: add a new function, check_visual_pos
          in src/misc2.c and invoke it in src/change.c and src/edit.c. Add the new
          function header in src/proto/misc2.pro and add test case
          Test_visual_block_with_substitute in src/testdir/test_visual.vim.
        - debian/patches/CVE-2022-1851.patch: add a call to check_cursor() after
          formatting in op_format() in src/ops.c and add test case
          Test_correct_cursor_position in src/testdir/test_CVE.vim.
        - debian/patches/CVE-2022-2845.patch: reading before the start of the line
        - CVE-2022-1629
        - CVE-2022-1720
        - CVE-2022-1733
        - CVE-2022-1735
        - CVE-2022-1851
        - CVE-2022-2845
      * SECURITY UPDATE: crash when matching buffer with invalid pattern
        - debian/patches/CVE-2022-1674.patch: check for NULL regprog
        - CVE-2022-1674
      * SECURITY UPDATE: buffer over-write
        - debian/patches/CVE-2022-1785.patch: add textlock flag to disallow
          changing text or switching window before calling vim_regsub_multi() in
          src/ex_cmds.c.
        - CVE-2022-1785
      * SECURITY UPDATE: heap-based buffer overflow
        - debian/patches/CVE-2022-1942.patch: adds a control to disallow the
          opening of a command line window when text or buffer is locked.
        - debian/patches/CVE-2022-2571.patch: reading past end of line with insert
          mode completion
        - debian/patches/CVE-2022-2849.patch: invalid memory access with for loop
          over NULL string
        - CVE-2022-1942
        - CVE-2022-2571
        - CVE-2022-2849
      * SECURITY UPDATE: searching for quotes may go over the end of the line
        - debian/patches/CVE-2022-2124.patch: check for running into the NULL
        - CVE-2022-2124
      * SECURITY UPDATE: lisp indenting my run over the end of the line
        - debian/patches/CVE-2022-2125.patch: check for NULL earlier
        - CVE-2022-2125
      * SECURITY UPDATE: using invalid index when looking for spell suggestions
        - debian/patches/CVE-2022-2126.patch: do not decrement the index when it
          is zero
        - CVE-2022-2126
      * SECURITY UPDATE: out-of-bounds write
        - debian/patches/CVE-2022-2129.patch: prevents the editing of another file
          when either curbuf_lock or textlock is set.
        - CVE-2022-2129
      * SECURITY UPDATE: invalid memory access when using an expression on the
        command line
        - debian/patches/CVE-2022-2175-1.patch: make sure the position does not
          go negative
        - debian/patches/CVE-2022-2175-2.patch: add missing #ifdef FEAT_EVAL
        - CVE-2022-2175
      * SECURITY UPDATE: reading beyond the end of the line with lisp indenting
        - debian/patches/CVE-2022-2183.patch: avoid going over the NUL at the end
          of the line
        - CVE-2022-2183
      * SECURITY UPDATE: accessing invalid memory after changing terminal size
        - debian/patches/CVE-2022-2206.patch: adjust cmdline_row and msg_row to
          the value of Rows
        - CVE-2022-2206
      * SECURITY UPDATE: spell dump may go beyond end of an array
        - debian/patches/CVE-2022-2304.patch: limit the word length
        - CVE-2022-2304
      * SECURITY UPDATE: using freed memory with recursive substitution
        - debian/patches/CVE-2022-2345.patch: always make a copy of
          reg_prev_sub
        - CVE-2022-2345
      * SECURITY UPDATE: illegal memory access when pattern starts with
        illegal byte
        - debian/patches/CVE-2022-2581.patch: do not match a character with an
          illegal byte
        - CVE-2022-2581
      * SECURITY UPDATE: null pointer dereference issue
        - debian/patches/CVE-2022-2923.patch: crash when using ":mkspell" with an
          empty .dic file
        - CVE-2022-2923
    
     -- Nishit Majithia <email address hidden>  Mon, 03 Apr 2023 11:32:48 +0530
  • vim (2:8.0.1453-1ubuntu1.11) bionic-security; urgency=medium
    
      * SECURITY UPDATE: NULL pointer dereference when creating blank mouse
        pointer
        - debian/patches/CVE-2022-47024.patch: only use the return value of
          XChangeGC() when it is not NULL.
        - CVE-2022-47024
      * SECURITY UPDATE: invalid memory access with bad 'statusline' value
        - debian/patches/CVE-2023-0049.patch: avoid going over the NULL at the end
          of a statusline.
        - CVE-2023-0049
      * SECURITY UPDATE: invalid memory access with recursive substitute
        expression
        - debian/patches/CVE-2023-0054.patch: check the return value of
          vim_regsub().
        - CVE-2023-0054
      * SECURITY UPDATE: invalid memory access with folding and using "L"
        - debian/patches/CVE-2023-0288.patch: prevent the cursor from moving to
          line zero.
        - CVE-2023-0288
      * SECURITY UPDATE: reading past the end of a line when formatting text
        - debian/patches/CVE-2023-0433.patch: check for not going over the end of
          the line.
        - CVE-2023-0433
      * SECURITY UPDATE: heap based buffer overflow vulnerability
        - debian/patches/CVE-2023-1170.patch: accessing invalid memory with put
          in Visual block mode
        - CVE-2023-1170
      * SECURITY UPDATE: incorrect calculation of buffer size
        - debian/patches/CVE-2023-1175.patch: illegal memory access when using
          virtual editing
        - CVE-2023-1175
    
     -- Nishit Majithia <email address hidden>  Fri, 17 Mar 2023 10:54:33 +0530
  • vim (2:8.0.1453-1ubuntu1.10) bionic-security; urgency=medium
    
      * SECURITY UPDATE: illegal memory access with bracketed paste in Ex mode
        - debian/patches/CVE-2022-0392.patch: reverse space for the trailing NUL
        - CVE-2022-0392
    
     -- Mark Esler <email address hidden>  Wed, 11 Jan 2023 17:53:52 -0600
  • vim (2:8.0.1453-1ubuntu1.9) bionic-security; urgency=medium
    
      * SECURITY UPDATE: heap based buffer overflow in spelling suggestion
        function
        - debian/patches/CVE-2022-0943.patch: adjust "badlen".
        - CVE-2022-0943
      * SECURITY UPDATE: use-after-free when processing regular expressions in old
        engine
        - debian/patches/CVE-2022-1154.patch: after getting mark get the line
          again.
        - CVE-2022-1154
      * SECURITY UPDATE: buffer overflow when using invalid command with composing
        chars
        - debian/patches/CVE-2022-1616.patch: check that the whole character fits
          in the buffer.
        - CVE-2022-1616
      * SECURITY UPDATE: heap buffer overflow when processing CTRL-W in latin1
        encoding
        - debian/patches/CVE-2022-1619.patch: check already being at the start of
          the command line.
        - CVE-2022-1619
      * SECURITY UPDATE: NULL pointer access when using invalid pattern
        - debian/patches/CVE-2022-1620.patch: check for failed regexp program.
        - CVE-2022-1620
      * SECURITY UPDATE: heap buffer overflow when processing invalid character
        added to word list
        - debian/patches/CVE-2022-1621.patch: check for a valid word string.
        - debian/patches/remove_test_spell_single_word.patch: removal of test
          test_spell_single_word from src/testdir/test_spell.vim
        - CVE-2022-1621
    
     -- Nishit Majithia <email address hidden>  Tue, 13 Sep 2022 20:37:18 +0530
  • vim (2:8.0.1453-1ubuntu1.8) bionic-security; urgency=medium
    
      * SECURITY UPDATE: Heap-based buffer overflow could lead to a denial of
        service or possible code execution when C-indenting
        - debian/patches/CVE-2021-3984.patch: Fix memory access issue by correctly
          dereferencing cursor position in src/misc1.c and
          src/testdir/test_cindent.vim
        - CVE-2021-3984
    
      * SECURITY UPDATE: Heap-based buffer overflow could lead to a denial of
        service when help functions are provided with long command strings
        - debian/patches/CVE-2021-4019.patch: Fix handling of strcpy to use safer
          vim_snprintf in src/ex_cmds.c and src/testdir/test_help.vim
        - CVE-2021-4019
    
      * SECURITY UPDATE: Use-after-free issue in open command can lead to a denial
        of service or possible code execution
        - debian/patches/CVE-2021-4069.patch: Fix issue making a copy of the
          current line and its address in src/ex_docmd.c
        - CVE-2021-4069
    
     -- Ray Veldkamp <email address hidden>  Thu, 20 Jan 2022 13:47:53 +1100
  • vim (2:8.0.1453-1ubuntu1.7) bionic-security; urgency=medium
    
      * SECURITY UPDATE: Fix heap-based buffer overflow when scrolling without a
        valid screen
        - debian/patches/CVE-2021-3903.patch: Do not set VALID_BOTLINE in w_valid
          in src/move.c, src/testdir/test_normal.vim.
        - CVE-2021-3903
      * SECURITY UPDATE: Fix heap-based buffer overflow when reading character
        past end of line
        - debian/patches/CVE-2021-3927.patch: Correct the cursor column in
          src/ex_docmd.c, src/testdir/test_put.vim.
        - CVE-2021-3927
      * SECURITY UPDATE: Fix stack-based buffer overflow when reading
        uninitialized memory when giving spell suggestions
        - debian/patches/CVE-2021-3928.patch: Check that preword is not empty in
          src/spell.c, src/testdir/test_spell.vim.
        - CVE-2021-3928
    
     -- Spyros Seimenis <email address hidden>  Tue, 09 Nov 2021 15:34:45 +0100
  • vim (2:8.0.1453-1ubuntu1.6) bionic-security; urgency=medium
    
      * SECURITY UPDATE: Fix heap-based buffer overflow when reading beyond end of
        line with invalid utf-8 character
        - debian/patches/CVE-2021-3778.patch: Validate encoding of character before
          advancing line in regexp_nfa.c.
        - CVE-2021-3778
      * SECURITY UPDATE: Fix use after free when replacing
        - debian/patches/CVE-2021-3796.patch: Get the line pointer after calling
          ins_copychar() in src/normal.c.
        - CVE-2021-3796
    
     -- Spyros Seimenis <email address hidden>  Mon, 20 Sep 2021 15:26:53 +0300
  • vim (2:8.0.1453-1ubuntu1.4) bionic-security; urgency=medium
    
      * SECURITY UPDATE: rvim restricted mode circumvention
        - debian/patches/CVE-2019-20807-1.patch: disable using interfaces in
          restricted mode in runtime/doc/starting.txt, src/evalfunc.c,
          src/ex_cmds.c, src/ex_docmd.c, src/if_perl.xs,
          src/testdir/Make_all.mak, src/testdir/test_restricted.vim.
        - debian/patches/CVE-2019-20807-2.patch: missing some changes for Ex
          commands in src/ex_cmds.h.
        - CVE-2019-20807
    
     -- Marc Deslauriers <email address hidden>  Tue, 13 Oct 2020 11:49:09 -0400
  • vim (2:8.0.1453-1ubuntu1.3) bionic-security; urgency=medium
    
      * SECURITY UPDATE: Application crash
        - debian/patches/CVE-2018-20786.patch: handle out of
          memory in src/libvterm/src/state.c, src/libvterm/src/vterm.c,
          src/terminal.c.
        - CVE-2018-20786
      * SECURITY UPDATE: Access after free
        - debian/patches/CVE-2019-20079.patch: avoid using 'wp'
          after autocommands in src/window.c, src/testdir/test_autocmd.vim.
        - debian/patches/patch-8.1.1192-mode-is-not-cleared*.patch:
          Clear the mode when redraw_cmdline is set in src/globals.h,
          src/screen.c.
        - CVE-2019-20079
    
     -- <email address hidden> (Leonidas S. Barbosa)  Wed, 18 Mar 2020 15:29:15 -0300
  • vim (2:8.0.1453-1ubuntu1.1) bionic-security; urgency=medium
    
      * SECURITY UPDATE: Arbitrary code execution
        - debian/patches/CVE-2019-12735.patch: disallow
          sourcing a file in the sandbox in src/getchar.c
        - CVE-2019-12735
    
     -- <email address hidden> (Leonidas S. Barbosa)  Thu, 06 Jun 2019 14:31:41 -0300
  • vim (2:8.0.1453-1ubuntu1) bionic; urgency=medium
    
      * Merge with Debian; remaining changes:
        - debian/runtime/vimrc:
          + "syntax on" is a sane default for non-tiny vim.
        - debian/patches/debian/ubuntu-grub-syntax.patch:
          + Add Ubuntu-specific "quiet" keyword.
        - debian/patches/debian/update-upstart-syntax.patch:
          + Add setuid and setgid to syntax file.
        - debian/patches/ubuntu-series-support.patch:
          + Drop vivid, wily, and yakkety, and add bionic.
        - debian/patches/ubuntu-mouse-off.patch:
          + Mouse mode is actively harmful in some chroots.
    
    vim (2:8.0.1453-1) unstable; urgency=medium
    
      [ upstream ]
      * 8.0.1452: terminal test fails on some systems
        + This should fix the massive FTBFS on the buildds
      * 8.0.1453: terminal test fails on some slow terminals
    
    vim (2:8.0.1451-1) unstable; urgency=medium
    
      [ David Rabel ]
      * Update Standards-Version to 4.1.3
    
      [ upstream ]
      * 8.0.1444: missing -D_FILE_OFFSET_BITS=64 may cause problems
        This should work around the inconsistent handling of large file support in
        glibc (#888566), which closes: #827319.
    
      [ James McCoy ]
      * Re-enable Perl bindings on kFreeBSD
      * Change Vcs-* to salsa.d.o
      * Bump debhelper compat to 11
      * Set R³ to no
      * d/control: Use https URL for Homepage
      * vim-doc: Move documentation under /usr/share/doc/vim, per §12.3
      * Remove doc/<arch pkg> → doc/<all pkg> symlinks
      * d/rules: Set .NOTPARALLEL to avoid dh_prep clobbering each other
    
    vim (2:8.0.1401-2) unstable; urgency=medium
    
      * debian.vim: Move a function definition inside an :if so it doesn't cause
        vim-tiny to spew lots of errors.  (Closes: #885073)
    
     -- Matthias Klose <email address hidden>  Tue, 10 Apr 2018 23:31:58 +0200
  • vim (2:8.0.1401-1ubuntu3) bionic; urgency=high
    
      * No change rebuild against ruby-defaults without ruby2.3.
    
     -- Dimitri John Ledkov <email address hidden>  Thu, 01 Mar 2018 12:30:15 +0000
  • vim (2:8.0.1401-1ubuntu2) bionic; urgency=medium
    
      * No-change rebuild for ruby2.5 update.
    
     -- Matthias Klose <email address hidden>  Thu, 01 Feb 2018 20:19:13 +0100
  • vim (2:8.0.1401-1ubuntu1) bionic; urgency=medium
    
      * Merge with Debian; remaining changes:
        - debian/runtime/vimrc:
          + "syntax on" is a sane default for non-tiny vim.
        - debian/patches/debian/ubuntu-grub-syntax.patch:
          + Add Ubuntu-specific "quiet" keyword.
        - debian/patches/debian/update-upstart-syntax.patch:
          + Add setuid and setgid to syntax file.
        - debian/patches/ubuntu-series-support.patch:
          + Drop vivid, wily, and yakkety, and add bionic.
        - debian/patches/ubuntu-mouse-off.patch:
          + Mouse mode is actively harmful in some chroots.
    
    vim (2:8.0.1401-1) unstable; urgency=medium
    
      [ upstream ]
      * syntax/sh.vim:
        + Fix syntax highlighting of $() when the /bin/sh is detected as
          POSIX-compliant.  (Closes: #848663)
        + Correctly highlight escaped single-quotes inside test expressions.
          (Closes: #761064)
    
      [ James McCoy ]
      * runtime/debian.vim:
        + Fix mechanism used to check for <S-Insert> mappings, since maparg()
          doesn't understand multiple modes in the {mode} argument.  Thanks to
          Sergey Vlasov for the patch!  (Closes: #883422)
      * syntax/debcontrol.vim:
        + Fix highlighting of "Section: javascript" … again.  (Closes: #884495)
    
    vim (2:8.0.1257-2) unstable; urgency=medium
    
      * Add patch to fix flakiness in test_search.vim
      * syntax/debcontrol.vim:
        + Recognize golang section.  Thanks to Guillem Jover.  (Closes: #880698)
    
    vim (2:8.0.1257-1) unstable; urgency=medium
    
      [ upstream ]
      * 8.0.1246: Fix flaky popup test, which should fix the various FTBFS from
        the last upload.
    
      [ James McCoy ]
      * syntax/debsources.vim:
        + Fix syntax error in definition of unsupported releases.  Thanks to Josh
          Triplett.  (Closes: #879986)
      * Declare compliance with Policy 4.1.1, no changes needed.
    
    vim (2:8.0.1226-1) unstable; urgency=medium
    
      [ upstream ]
      * 8.0.1154: Fix indentation when 'indentkeys' is in use.  (Closes: #877262)
    
      [ James McCoy ]
      * syntax/debcontrol.vim:
        + Add support for all fields in deb-src-control(5).  (Closes: #878970)
      * syntax/deb{sources,changelog}.vim:
        + Add bionic release and mark yakkety & squeeze unsupported.
    
     -- Matthias Klose <email address hidden>  Fri, 22 Dec 2017 16:58:22 +0100
  • vim (2:8.0.1144-1ubuntu1) bionic; urgency=medium
    
      * Merge from Debian unstable.  Remaining changes:
        - debian/runtime/vimrc:
          + "syntax on" is a sane default for non-tiny vim.
        - debian/patches/debian/ubuntu-grub-syntax.patch:
          + Add Ubuntu-specific "quiet" keyword.
        - debian/patches/debian/update-upstart-syntax.patch:
          + Add setuid and setgid to syntax file.
        - debian/patches/ubuntu-series-support.patch:
          + Drop vivid, wily, and yakkety, and add bionic.
        - debian/patches/ubuntu-mouse-off.patch:
          + Mouse mode is actively harmful in some chroots.
    
    vim (2:8.0.1144-1) unstable; urgency=medium
    
      [ upstream ]
      * Fix detection/enabling of cursor blink state.  (Closes: #872302)
      * ftplugin/perl.vim: Set 'iskeyword' local to the buffer so it doesn't
        affect subsequently opened buffers.  (Closes: #873755)
      * syntax/mason.vim: Correctly highlight mason files again.  (Closes:
        #700016)
    
      [ James McCoy ]
      * debcontrol.vim:
        + Recognize Testsuite field  (Closes: #872360)
        + Treat tabs as valid whitespace  (Closes: #872557)
      * Declare compliance with Policy 4.1.0, no changes needed
      * Add basic autopkgtests
      * Add missing postrm for symlink_to_dir maintscripts
    
    vim (2:8.0.0946-1) unstable; urgency=medium
    
      [ upstream ]
      * 8.0.0939, 8.0.0940: Handle flakiness in terminal tests.  (Closes: #872164)
      * 8.0.0944: test_profile: Accept a match when self and total time are the
        same.
      * 8.0.0946: Don't rely on PATH_MAX.  Fixes FTBFS on hurd.
    
    vim (2:8.0.0937-1) unstable; urgency=medium
    
      [ upstream ]
      * 8.0.0210 et.al.: Add support for bracketed paste.  (Closes: #504244)
      * 8.0.0421: Fix display in diff mode when adding a line at the end of a
        buffer.  (Closes: #846993)
      * 8.0.0693 et.al.: Implement a terminal emulator.
      * 8.0.0698: Fix a crash on exit when using a Python function from a timer.
        (Closes: #868767)
      * 8.0.0737: Crash when X11 selection is very big  (Closes: #606957)
    
      [ James McCoy ]
      * vim-policy:
        + Specify the "addon", not "name", field is used to declare the addon.
          Thanks to Reiner Herrmann.
      * Merge changes from Ubuntu, dependent on DEB_VENDOR=Ubuntu:
        + Remove --disable-python3interp on Ubuntu for vim-basic
        + Disable ruby for vim-gtk3
      * d/rules:
        + Remove src/po/vim.pot and *.pyc during clean
        + Remove explicit setting of SOURCE_DATE_EPOCH since dpkg's pkg-info.mk
          provides it.
      * debcontrol.vim:
        + Add highlighting for Build-(Depends|Conflicts)-Arch
        + Fix syntax highlighting of "javascript" section.  (Closes: #867307)
      * Rewrite d/copyright in machine readable format.  (Closes: #819734)
        + Properly document xxd's license.  (Closes: #776191)
      * Mark vim-doc and xxd Multi-Arch: foreign.  Thanks to Helmut Grohne for the
        patch.  (Closes: #852722)
      * Declare compliance with policy 4.0.1
        + Change Priority: extra packages to optional
      * Reference Python 3 instead of Python in long descriptions.  (Closes:
        #868020)
      * Bump debhelper compat to 10.
      * debian/control:
        + Remove version constraints that are satisifed in oldstable.
    
    vim (2:8.0.0197-5) unstable; urgency=high
    
      * Backport upstream patches to fix CVE-2017-11109  (Closes: #867720)
        + 8.0.0703: Illegal memory access with empty :doau command
        + 8.0.0706: Crash when cancelling the cmdline window in Ex mode
        + 8.0.0707: Freeing wrong memory when manipulating buffers in autocommands
    
     -- Adam Conrad <email address hidden>  Wed, 25 Oct 2017 05:27:27 -0600
  • vim (2:8.0.0197-4ubuntu5) artful; urgency=medium
    
      * No-change rebuild for perl 5.26.0.
    
     -- Matthias Klose <email address hidden>  Wed, 26 Jul 2017 20:13:43 +0000