USN-6154-1: Vim vulnerabilities
12 June 2023
Several security issues were fixed in Vim.
Releases
- Ubuntu 23.04
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 ESM
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Packages
- vim - Vi IMproved - enhanced vi editor
Details
It was discovered that Vim was using uninitialized memory when fuzzy
matching, which could lead to invalid memory access. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu
23.04. (CVE-2023-2426)
It was discovered that Vim was not properly performing bounds checks when
processing register contents, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-2609)
It was discovered that Vim was not properly limiting the length of
substitution expression strings, which could lead to excessive memory
consumption. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-2610)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04
Ubuntu 22.10
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
-
vim
-
2:8.0.1453-1ubuntu1.13+esm1
Available with Ubuntu Pro
-
vim-tiny
-
2:8.0.1453-1ubuntu1.13+esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
vim
-
2:7.4.1689-3ubuntu1.5+esm18
Available with Ubuntu Pro
-
vim-tiny
-
2:7.4.1689-3ubuntu1.5+esm18
Available with Ubuntu Pro
Ubuntu 14.04
-
vim
-
2:7.4.052-1ubuntu3.1+esm10
Available with Ubuntu Pro
-
vim-tiny
-
2:7.4.052-1ubuntu3.1+esm10
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.