logo
DATABASE RESOURCES PRICING ABOUT US

Vim vulnerabilities

Description

## Releases * Ubuntu 16.04 ESM ## Packages * vim \- Vi IMproved - enhanced vi editor It was discovered that Vim incorrectly handled parsing of filenames in its search functionality. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. (CVE-2021-3973) It was discovered that Vim incorrectly handled memory when opening and searching the contents of certain files. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2021-3974) It was discovered that Vim incorrectly handled memory when opening and editing certain files. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2021-3984, CVE-2021-4019, CVE-2021-4069) It was discovered that Vim was using freed memory when dealing with regular expressions inside a visual selection. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2021-4192) It was discovered that Vim was incorrectly performing read and write operations when in visual block mode, going beyond the end of a line and causing a heap buffer overflow. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2022-0261, CVE-2022-0318) It was discovered that Vim was using freed memory when dealing with regular expressions through its old regular expression engine. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2022-1154)


Affected Package


OS OS Version Package Name Package Version
Ubuntu 16.04 vim 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-tiny-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-tiny 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-runtime 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-nox-py2-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-nox-py2 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-nox-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-nox 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gui-common 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gtk3-py2-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gtk3-py2 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gtk3-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gtk3 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gtk-py2-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gtk-py2 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gtk-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gtk 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gnome-py2-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gnome-py2 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gnome-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-gnome 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-doc 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-common-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-common 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-athena-py2-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-athena-py2 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-athena-dbgsym 2:7.4.1689-3ubuntu1.5+esm4
Ubuntu 16.04 vim-athena 2:7.4.1689-3ubuntu1.5+esm4

Related