USN-7048-2: Vim vulnerability
16 October 2024
Vim could be made to crash if it received specially crafted input.
Releases
Packages
- vim - Vi IMproved - enhanced vi editor
Details
USN-7048-1 fixed a vulnerability in Vim. This update provides the
corresponding update for Ubuntu 14.04 LTS.
Original advisory details:
Suyue Guo discovered that Vim incorrectly handled memory when flushing the
typeahead buffer, leading to heap-buffer-overflow. An attacker could
possibly use this issue to cause a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
vim
-
2:7.4.052-1ubuntu3.1+esm19
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-7048-1: vim-gtk3, xxd, vim-runtime, vim-gnome, vim-nox-py2, vim-gtk-py2, vim-nox, vim-common, vim-motif, vim, vim-gnome-py2, vim-athena-py2, vim-athena, vim-gui-common, vim-gtk, vim-gtk3-py2, vim-tiny, vim-doc