It was discovered that Vim incorrectly handled memory access. If a
user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | vim | < 2:7.4.1689-3ubuntu1.5+esm12 | UNKNOWN |
Ubuntu | 16.04 | noarch | vim | < 2:7.4.1689-3ubuntu1.5 | UNKNOWN |
Ubuntu | 16.04 | noarch | vim-athena | < 2:7.4.1689-3ubuntu1.5 | UNKNOWN |
Ubuntu | 16.04 | noarch | vim-athena-dbgsym | < 2:7.4.1689-3ubuntu1.5 | UNKNOWN |
Ubuntu | 16.04 | noarch | vim-athena-py2 | < 2:7.4.1689-3ubuntu1.5 | UNKNOWN |
Ubuntu | 16.04 | noarch | vim-athena-py2-dbgsym | < 2:7.4.1689-3ubuntu1.5 | UNKNOWN |
Ubuntu | 16.04 | noarch | vim-common | < 2:7.4.1689-3ubuntu1.5 | UNKNOWN |
Ubuntu | 16.04 | noarch | vim-common-dbgsym | < 2:7.4.1689-3ubuntu1.5 | UNKNOWN |
Ubuntu | 16.04 | noarch | vim-dbgsym | < 2:7.4.1689-3ubuntu1.5 | UNKNOWN |
Ubuntu | 16.04 | noarch | vim-doc | < 2:7.4.1689-3ubuntu1.5 | UNKNOWN |