Headline
Ubuntu Security Notice USN-5963-1
Ubuntu Security Notice 5963-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10.
==========================================================================Ubuntu Security Notice USN-5963-1March 20, 2023vim vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 22.10- Ubuntu 22.04 LTS- Ubuntu 20.04 LTS- Ubuntu 18.04 LTS- Ubuntu 16.04 ESM- Ubuntu 14.04 ESMSummary:Several security issues were fixed in Vim.Software Description:- vim: Vi IMproved - enhanced vi editorDetails:It was discovered that Vim was not properly performing memory managementoperations. An attacker could possibly use this issue to cause a denialof service or execute arbitrary code. This issue only affected Ubuntu 18.04LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-47024,CVE-2023-0049, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433)It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04LTS, and Ubuntu 22.10. (CVE-2023-0051)It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2023-1170, CVE-2023-1175)It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 20.04LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2023-1264)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 22.10: vim 2:9.0.0242-1ubuntu1.2 vim-athena 2:9.0.0242-1ubuntu1.2 vim-gtk3 2:9.0.0242-1ubuntu1.2 vim-nox 2:9.0.0242-1ubuntu1.2 vim-tiny 2:9.0.0242-1ubuntu1.2Ubuntu 22.04 LTS: vim 2:8.2.3995-1ubuntu2.4 vim-athena 2:8.2.3995-1ubuntu2.4 vim-gtk 2:8.2.3995-1ubuntu2.4 vim-gtk3 2:8.2.3995-1ubuntu2.4 vim-nox 2:8.2.3995-1ubuntu2.4 vim-tiny 2:8.2.3995-1ubuntu2.4Ubuntu 20.04 LTS: vim 2:8.1.2269-1ubuntu5.12 vim-athena 2:8.1.2269-1ubuntu5.12 vim-gtk 2:8.1.2269-1ubuntu5.12 vim-gtk3 2:8.1.2269-1ubuntu5.12 vim-nox 2:8.1.2269-1ubuntu5.12 vim-tiny 2:8.1.2269-1ubuntu5.12Ubuntu 18.04 LTS: vim 2:8.0.1453-1ubuntu1.11 vim-athena 2:8.0.1453-1ubuntu1.11 vim-gtk 2:8.0.1453-1ubuntu1.11 vim-gtk3 2:8.0.1453-1ubuntu1.11 vim-nox 2:8.0.1453-1ubuntu1.11 vim-tiny 2:8.0.1453-1ubuntu1.11Ubuntu 16.04 ESM: vim 2:7.4.1689-3ubuntu1.5+esm17 vim-athena 2:7.4.1689-3ubuntu1.5+esm17 vim-athena-py2 2:7.4.1689-3ubuntu1.5+esm17 vim-gtk 2:7.4.1689-3ubuntu1.5+esm17 vim-gtk-py2 2:7.4.1689-3ubuntu1.5+esm17 vim-gtk3 2:7.4.1689-3ubuntu1.5+esm17 vim-gtk3-py2 2:7.4.1689-3ubuntu1.5+esm17 vim-nox 2:7.4.1689-3ubuntu1.5+esm17 vim-nox-py2 2:7.4.1689-3ubuntu1.5+esm17 vim-tiny 2:7.4.1689-3ubuntu1.5+esm17Ubuntu 14.04 ESM: vim 2:7.4.052-1ubuntu3.1+esm7 vim-athena 2:7.4.052-1ubuntu3.1+esm7 vim-gtk 2:7.4.052-1ubuntu3.1+esm7 vim-nox 2:7.4.052-1ubuntu3.1+esm7 vim-tiny 2:7.4.052-1ubuntu3.1+esm7In general, a standard system update will make all the necessary changes.References: https://ubuntu.com/security/notices/USN-5963-1 CVE-2022-47024, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264Package Information: https://launchpad.net/ubuntu/+source/vim/2:9.0.0242-1ubuntu1.2 https://launchpad.net/ubuntu/+source/vim/2:8.2.3995-1ubuntu2.4 https://launchpad.net/ubuntu/+source/vim/2:8.1.2269-1ubuntu5.12 https://launchpad.net/ubuntu/+source/vim/2:8.0.1453-1ubuntu1.11
Related news
Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...
A privacy issue was addressed by moving sensitive data to a more secure location. This issue is fixed in macOS Ventura 13.3. An app may be able to access user-sensitive data
A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Big Sur 11.7.5. An app may be able to disclose kernel memory
Gentoo Linux Security Advisory 202305-16 - Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. Versions less than 9.0.1157 are affected.
Apple Security Advisory 2023-03-27-5 - macOS Big Sur 11.7.5 addresses bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
Apple Security Advisory 2023-03-27-4 - macOS Monterey 12.6.4 addresses bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1392.
Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1376.
Red Hat Security Advisory 2023-0958-01 - Vim is an updated and improved version of the vi editor.
An update for vim is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-47024: A NULL pointer dereference issue was found in Vim's gui_x11_create_blank_mouse function in gui_x11.c. This flaw allows attackers to cause a denial of service and other unspecified impacts.
Ubuntu Security Notice 5836-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5836-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5836-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5836-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5836-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
A null pointer dereference issue was discovered in function gui_x11_create_blank_mouse in gui_x11.c in vim 8.1.2269 thru 9.0.0339 allows attackers to cause denial of service or other unspecified impacts.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1189.
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.