USN-5433-1: Vim vulnerabilities
23 May 2022
Several security issues were fixed in Vim.
Releases
Packages
- vim - Vi IMproved - enhanced vi editor
Details
It was discovered that Vim incorrectly handled parsing of filenames in its
search functionality. If a user were tricked into opening a specially crafted
file, an attacker could crash the application, leading to a denial of
service. (CVE-2021-3973)
It was discovered that Vim incorrectly handled memory when opening and
searching the contents of certain files. If a user were tricked into opening
a specially crafted file, an attacker could crash the application, leading to
a denial of service, or possibly achieve code execution with user privileges.
(CVE-2021-3974)
It was discovered that Vim incorrectly handled memory when opening and editing
certain files. If a user were tricked into opening a specially crafted file,
an attacker could crash the application, leading to a denial of service, or
possibly achieve code execution with user privileges. (CVE-2021-3984,
CVE-2021-4019, CVE-2021-4069)
It was discovered that Vim was using freed memory when dealing with regular
expressions inside a visual selection. If a user were tricked into opening a
specially crafted file, an attacker could crash the application, leading to a
denial of service, or possibly achieve code execution with user privileges.
(CVE-2021-4192)
It was discovered that Vim was incorrectly performing read and write
operations when in visual block mode, going beyond the end of a line and
causing a heap buffer overflow. If a user were tricked into opening a
specially crafted file, an attacker could crash the application, leading to a
denial of service, or possibly achieve code execution with user privileges.
(CVE-2022-0261, CVE-2022-0318)
It was discovered that Vim was using freed memory when dealing with regular
expressions through its old regular expression engine. If a user were tricked
into opening a specially crafted file, an attacker could crash the application,
leading to a denial of service, or possibly achieve code execution with user
privileges. (CVE-2022-1154)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
vim
-
2:7.4.1689-3ubuntu1.5+esm4
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
Related notices
- USN-6026-1: vim-gui-common, vim-gtk3, vim-common, vim-doc, vim-gtk, vim-runtime, vim-lesstif, vim, vim-tiny, vim-nox, xxd, vim-gnome, vim-athena
- USN-5247-1: vim-gui-common, vim-gtk3, vim-common, vim-doc, vim-gtk, vim-runtime, vim, vim-tiny, vim-nox, xxd, vim-gnome, vim-athena
- USN-6965-1: vim-gui-common, vim-common, vim-doc, vim-gtk, vim-runtime, vim-lesstif, vim, vim-tiny, vim-nox, vim-gnome, vim-athena
- USN-5613-1: vim-gui-common, vim-gtk3, vim-common, vim-doc, vim-gtk, vim-runtime, vim-lesstif, vim, vim-tiny, vim-nox, xxd, vim-gnome, vim-athena
- USN-5613-2: vim-gui-common, vim-gtk3, vim-common, vim-doc, vim-gtk, vim-runtime, vim, vim-tiny, vim-nox, xxd, vim-athena