[USN-5995-1] Vim vulnerabilities

Nishit Majithia nishit.majithia at canonical.com
Tue Apr 4 11:04:47 UTC 2023


==========================================================================
Ubuntu Security Notice USN-5995-1
April 04, 2023

vim vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in Vim.

Software Description:
- vim: Vi IMproved - enhanced vi editor

Details:

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
and Ubuntu 22.04 LTS. (CVE-2022-0413, CVE-2022-1629, CVE-2022-1674,
CVE-2022-1733, CVE-2022-1735, CVE-2022-1785, CVE-2022-1796, CVE-2022-1851,
CVE-2022-1898, CVE-2022-1942, CVE-2022-1968, CVE-2022-2124, CVE-2022-2125,
CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2183, CVE-2022-2206,
CVE-2022-2304, CVE-2022-2345, CVE-2022-2581)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-1720, CVE-2022-2571, CVE-2022-2845, CVE-2022-2849,
CVE-2022-2923)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-1927,
CVE-2022-2344)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
and Ubuntu 22.10. (CVE-2022-2946)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-2980)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  vim                             2:9.0.0242-1ubuntu1.3
  vim-athena                      2:9.0.0242-1ubuntu1.3
  vim-gtk3                        2:9.0.0242-1ubuntu1.3
  vim-motif                       2:9.0.0242-1ubuntu1.3
  vim-nox                         2:9.0.0242-1ubuntu1.3
  vim-tiny                        2:9.0.0242-1ubuntu1.3

Ubuntu 22.04 LTS:
  vim                             2:8.2.3995-1ubuntu2.5
  vim-athena                      2:8.2.3995-1ubuntu2.5
  vim-gtk                         2:8.2.3995-1ubuntu2.5
  vim-gtk3                        2:8.2.3995-1ubuntu2.5
  vim-nox                         2:8.2.3995-1ubuntu2.5
  vim-tiny                        2:8.2.3995-1ubuntu2.5

Ubuntu 20.04 LTS:
  vim                             2:8.1.2269-1ubuntu5.13
  vim-athena                      2:8.1.2269-1ubuntu5.13
  vim-gtk                         2:8.1.2269-1ubuntu5.13
  vim-gtk3                        2:8.1.2269-1ubuntu5.13
  vim-nox                         2:8.1.2269-1ubuntu5.13
  vim-tiny                        2:8.1.2269-1ubuntu5.13

Ubuntu 18.04 LTS:
  vim                             2:8.0.1453-1ubuntu1.12
  vim-athena                      2:8.0.1453-1ubuntu1.12
  vim-gnome                       2:8.0.1453-1ubuntu1.12
  vim-gtk                         2:8.0.1453-1ubuntu1.12
  vim-gtk3                        2:8.0.1453-1ubuntu1.12
  vim-nox                         2:8.0.1453-1ubuntu1.12
  vim-tiny                        2:8.0.1453-1ubuntu1.12

Ubuntu 14.04 ESM:
  vim                             2:7.4.052-1ubuntu3.1+esm8
  vim-athena                      2:7.4.052-1ubuntu3.1+esm8
  vim-gnome                       2:7.4.052-1ubuntu3.1+esm8
  vim-gtk                         2:7.4.052-1ubuntu3.1+esm8
  vim-nox                         2:7.4.052-1ubuntu3.1+esm8
  vim-tiny                        2:7.4.052-1ubuntu3.1+esm8

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5995-1
  CVE-2022-0413, CVE-2022-1629, CVE-2022-1674, CVE-2022-1720,
  CVE-2022-1733, CVE-2022-1735, CVE-2022-1785, CVE-2022-1796,
  CVE-2022-1851, CVE-2022-1898, CVE-2022-1927, CVE-2022-1942,
  CVE-2022-1968, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126,
  CVE-2022-2129, CVE-2022-2175, CVE-2022-2183, CVE-2022-2206,
  CVE-2022-2304, CVE-2022-2344, CVE-2022-2345, CVE-2022-2571,
  CVE-2022-2581, CVE-2022-2845, CVE-2022-2849, CVE-2022-2923,
  CVE-2022-2946, CVE-2022-2980

Package Information:
  https://launchpad.net/ubuntu/+source/vim/2:9.0.0242-1ubuntu1.3
  https://launchpad.net/ubuntu/+source/vim/2:8.2.3995-1ubuntu2.5
  https://launchpad.net/ubuntu/+source/vim/2:8.1.2269-1ubuntu5.13
  https://launchpad.net/ubuntu/+source/vim/2:8.0.1453-1ubuntu1.12
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 659 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230404/c81dfd10/attachment.sig>


More information about the ubuntu-security-announce mailing list