Ubuntu Security Notice 5093-1 - Brian Carpenter discovered that vim incorrectly handled memory when opening certain files. If a user was tricked into opening a specially crafted file, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. This issue only affected Ubuntu 20.04 LTS and Ubuntu 21.04. Brian Carpenter discovered that vim incorrectly handled memory when opening certain files. If a user was tricked into opening a specially crafted file, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. Various other issues were also addressed.
c4de699295308995e581a4fe17697bd8bdf4568f3c040db7dede29c2d61a0c08
==========================================================================
Ubuntu Security Notice USN-5093-1
September 28, 2021
vim vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in Vim.
Software Description:
- vim: Vi IMproved - enhanced vi editor
Details:
Brian Carpenter discovered that vim incorrectly handled memory
when opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possibly execute
arbitrary code with user privileges. This issue only affected
Ubuntu 20.04 LTS and Ubuntu 21.04. (CVE-2021-3770)
Brian Carpenter discovered that vim incorrectly handled memory
when opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possibly execute
arbitrary code with user privileges. (CVE-2021-3778)
Dhiraj Mishra discovered that vim incorrectly handled memory
when opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possibly execute
arbitrary code with user privileges. (CVE-2021-3796)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 21.04:
vim 2:8.2.2434-1ubuntu1.1
Ubuntu 20.04 LTS:
vim 2:8.1.2269-1ubuntu5.3
Ubuntu 18.04 LTS:
vim 2:8.0.1453-1ubuntu1.6
Ubuntu 16.04 ESM:
vim 2:7.4.1689-3ubuntu1.5+esm2
Ubuntu 14.04 ESM:
vim 2:7.4.052-1ubuntu3.1+esm3
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5093-1
CVE-2021-3770, CVE-2021-3778, CVE-2021-3796
Package Information:
https://launchpad.net/ubuntu/+source/vim/2:8.2.2434-1ubuntu1.1
https://launchpad.net/ubuntu/+source/vim/2:8.1.2269-1ubuntu5.3
https://launchpad.net/ubuntu/+source/vim/2:8.0.1453-1ubuntu1.6