USN-5507-1: Vim vulnerabilities
8 July 2022
Several security issues were fixed in Vim.
Releases
Packages
- vim - Vi IMproved - enhanced vi editor
Details
It was discovered that Vim incorrectly handled memory access. An attacker
could potentially use this issue to cause the program to crash, use unexpected
values, or execute arbitrary code. (CVE-2022-1968)
It was discovered that Vim incorrectly handled memory access. An attacker
could potentially use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution.
(CVE-2022-1897, CVE-2022-1942)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
vim
-
2:7.4.1689-3ubuntu1.5+esm10
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5995-1: vim-motif, vim, vim-gtk, vim-runtime, xxd, vim-common, vim-lesstif, vim-gui-common, vim-doc, vim-nox, vim-tiny, vim-athena, vim-gtk3, vim-gnome
- USN-6557-1: vim-gtk, vim-lesstif, vim-gui-common, vim-doc, vim-gtk3, vim, xxd, vim-common, vim-gnome, vim-athena-py2, vim-tiny, vim-nox, vim-gtk-py2, vim-gtk3-py2, vim-motif, vim-nox-py2, vim-athena, vim-gnome-py2, vim-runtime