Hi James,

On Tue, Sep 14, 2021 at 09:06:22PM -0400, James McCoy wrote:
> On Sat, Sep 11, 2021 at 09:26:04AM +0200, Salvatore Bonaccorso wrote:
> > The following vulnerability was published for vim.
> > 
> > CVE-2021-3770[0]:
> > | vim is vulnerable to Heap-based Buffer Overflow
> > 
> > The fix is at [1] but needed a followup [2].
> 
> Does this need to go through bullseye-security or would a bullseye
> upload suffice?  I have a couple other fixes (#993766 and maybe #994209)
> in the pipeline that would be good for bullseye, so I could group these
> together.

IMHO it should be enough to route the update trough the upcoming point
release(s) for bullseye and buster (would you as well prepare an
update there for buster?)

Currently both are planned, cf.
https://lists.debian.org/debian-release/2021/09/msg00373.html

Regards,
Salvatore

Reply via email to