USN-7048-2: Vim vulnerability
16 October 2024
Vim could be made to crash if it received specially crafted input.
Releases
Packages
- vim - Vi IMproved - enhanced vi editor
Details
USN-7048-1 fixed a vulnerability in Vim. This update provides the
corresponding update for Ubuntu 14.04 LTS.
Original advisory details:
Suyue Guo discovered that Vim incorrectly handled memory when flushing the
typeahead buffer, leading to heap-buffer-overflow. An attacker could
possibly use this issue to cause a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
vim
-
2:7.4.052-1ubuntu3.1+esm19
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-7048-1: vim-gnome, vim-athena-py2, vim-common, vim-gtk3, vim-athena, vim-gnome-py2, vim-motif, vim-nox-py2, vim-runtime, xxd, vim-gtk3-py2, vim-doc, vim-gui-common, vim-gtk-py2, vim-nox, vim, vim-tiny, vim-gtk