[USN-5247-1] Vim vulnerabilities

Ray Veldkamp ray.veldkamp at canonical.com
Thu Jan 27 10:13:42 UTC 2022


==========================================================================
Ubuntu Security Notice USN-5247-1
January 27, 2022

vim vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Vim.

Software Description:
- vim: Vi IMproved - enhanced vi editor

Details:

It was discovered that vim incorrectly handled parsing of filenames in its
search functionality. If a user was tricked into opening a specially crafted
file, an attacker could crash the application, leading to a denial of
service. This issue only affected Ubuntu 21.10. (CVE-2021-3973)

It was discovered that vim incorrectly handled memory when opening and
searching the contents of certain files. If a user was tricked into opening
a specially crafted file, an attacker could crash the application, 
leading to
a denial of service, or possibly achieve code execution with user 
privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 21.10. (CVE-2021-3974)

It was discovered that vim incorrectly handled memory when opening and 
editing
certain files. If a user was tricked into opening a specially crafted 
file, an
attacker could crash the application, leading to a denial of service, or
possibly achieve code execution with user privileges. (CVE-2021-3984)

It was discovered that vim incorrectly handled memory when opening and 
editing
certain files. If a user was tricked into opening a specially crafted 
file, an
attacker could crash the application, leading to a denial of service, or
possibly achieve code execution with user privileges. (CVE-2021-4019)

It was discovered that vim incorrectly handled memory when opening and 
editing
certain files. If a user was tricked into opening a specially crafted 
file, an
attacker could crash the application, leading to a denial of service, or
possibly achieve code execution with user privileges.(CVE-2021-4069)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.10:
vim 2:8.2.2434-3ubuntu3.2

Ubuntu 20.04 LTS:
vim 2:8.1.2269-1ubuntu5.6

Ubuntu 18.04 LTS:
vim 2:8.0.1453-1ubuntu1.8

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5247-1
CVE-2021-3973, CVE-2021-3974, CVE-2021-3984, CVE-2021-4019,
CVE-2021-4069

Package Information:
https://launchpad.net/ubuntu/+source/vim/2:8.2.2434-3ubuntu3.2
https://launchpad.net/ubuntu/+source/vim/2:8.1.2269-1ubuntu5.6
https://launchpad.net/ubuntu/+source/vim/2:8.0.1453-1ubuntu1.8

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20220127/f49267c2/attachment.sig>


More information about the ubuntu-security-announce mailing list