USN-5516-1: Vim vulnerabilities
13 July 2022
Several security issues were fixed in Vim.
Releases
Packages
- vim - Vi IMproved - enhanced vi editor
Details
It was discovered that Vim incorrectly handled memory access. An attacker
could potentially use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
vim
-
2:7.4.1689-3ubuntu1.5+esm11
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6270-1: vim-gtk3-py2, vim-gtk3, vim-gui-common, vim-common, vim-doc, vim-gnome-py2, vim-gtk, vim-gtk-py2, vim-lesstif, vim-nox-py2, vim-runtime, vim, vim-tiny, vim-nox, vim-athena-py2, vim-gnome, vim-athena, xxd
- USN-6557-1: vim-nox-py2, xxd, vim-gtk3-py2, vim-gtk-py2, vim-lesstif, vim-athena, vim-gtk3, vim-common, vim-gnome-py2, vim-gtk, vim-runtime, vim-tiny, vim-motif, vim-gui-common, vim-doc, vim, vim-nox, vim-athena-py2, vim-gnome
- USN-6026-1: vim-gui-common, vim-gtk3, vim-common, vim-doc, vim-gtk, vim-runtime, vim-lesstif, vim, vim-tiny, vim-nox, xxd, vim-gnome, vim-athena