USN-5516-1: Vim vulnerabilities
13 July 2022
Several security issues were fixed in Vim.
Releases
Packages
- vim - Vi IMproved - enhanced vi editor
Details
It was discovered that Vim incorrectly handled memory access. An attacker
could potentially use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
vim
-
2:7.4.1689-3ubuntu1.5+esm11
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6270-1: vim-tiny, vim-common, vim-athena, vim, vim-gui-common, vim-nox, vim-runtime, vim-gtk-py2, xxd, vim-nox-py2, vim-gnome, vim-gnome-py2, vim-athena-py2, vim-gtk, vim-lesstif, vim-gtk3, vim-doc, vim-gtk3-py2
- USN-6557-1: vim-nox, vim-gnome-py2, vim-doc, vim-tiny, vim-gtk-py2, vim-nox-py2, vim-gnome, xxd, vim-gtk3, vim-gtk3-py2, vim-common, vim-runtime, vim-athena, vim, vim-motif, vim-lesstif, vim-athena-py2, vim-gtk, vim-gui-common
- USN-6026-1: vim-tiny, vim-common, vim-athena, vim, vim-gui-common, vim-nox, vim-runtime, xxd, vim-gnome, vim-lesstif, vim-gtk, vim-gtk3, vim-doc