Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6557-1

Ubuntu Security Notice 6557-1 - It was discovered that Vim could be made to dereference invalid memory. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. It was discovered that Vim could be made to recurse infinitely. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.

Packet Storm
#vulnerability#ubuntu#dos#perl
==========================================================================Ubuntu Security Notice USN-6557-1December 14, 2023vim vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 23.10- Ubuntu 23.04- Ubuntu 22.04 LTS- Ubuntu 20.04 LTS- Ubuntu 18.04 LTS (Available with Ubuntu Pro)- Ubuntu 16.04 LTS (Available with Ubuntu Pro)- Ubuntu 14.04 LTS (Available with Ubuntu Pro)Summary:Several security issues were fixed in Vim.Software Description:- vim: Vi IMproved - enhanced vi editorDetails:It was discovered that Vim could be made to dereference invalid memory. Anattacker could possibly use this issue to cause a denial of service. Thisissue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04LTS. (CVE-2022-1725)It was discovered that Vim could be made to recurse infinitely. Anattacker could possibly use this issue to cause a denial of service. Thisissue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1771)It was discovered that Vim could be made to write out of bounds with a putcommand. An attacker could possibly use this issue to cause a denial ofservice or execute arbitrary code. This issue only affected Ubuntu 22.04LTS. (CVE-2022-1886)It was discovered that Vim could be made to write out of bounds. Anattacker could possibly use this issue to cause a denial of service orexecute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1897,CVE-2022-2000)It was discovered that Vim did not properly manage memory in the spellcommand. An attacker could possibly use this issue to cause a denial ofservice or execute arbitrary code. This issue only affected Ubuntu 22.04LTS. (CVE-2022-2042)It was discovered that Vim did not properly manage memory. An attackercould possibly use this issue to cause a denial of service or executearbitrary code. (CVE-2023-46246, CVE-2023-48231)It was discovered that Vim could be made to divide by zero. An attackercould possibly use this issue to cause a denial of service. This issueonly affected Ubuntu 23.04 and Ubuntu 23.10. (CVE-2023-48232)It was discovered that Vim contained multiple arithmetic overflows. Anattacker could possibly use these issues to cause a denial of service.(CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236,CVE-2023-48237)It was discovered that Vim did not properly manage memory in thesubstitute command. An attacker could possibly use this issue to cause adenial of service or execute arbitrary code. This issue only affectedUbuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-48706)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 23.10:   vim                             2:9.0.1672-1ubuntu2.2   vim-athena                      2:9.0.1672-1ubuntu2.2   vim-gtk3                        2:9.0.1672-1ubuntu2.2   vim-nox                         2:9.0.1672-1ubuntu2.2   vim-tiny                        2:9.0.1672-1ubuntu2.2   xxd                             2:9.0.1672-1ubuntu2.2Ubuntu 23.04:   vim                             2:9.0.1000-4ubuntu3.3   vim-athena                      2:9.0.1000-4ubuntu3.3   vim-gtk3                        2:9.0.1000-4ubuntu3.3   vim-nox                         2:9.0.1000-4ubuntu3.3   vim-tiny                        2:9.0.1000-4ubuntu3.3   xxd                             2:9.0.1000-4ubuntu3.3Ubuntu 22.04 LTS:   vim                             2:8.2.3995-1ubuntu2.15   vim-athena                      2:8.2.3995-1ubuntu2.15   vim-gtk                         2:8.2.3995-1ubuntu2.15   vim-gtk3                        2:8.2.3995-1ubuntu2.15   vim-nox                         2:8.2.3995-1ubuntu2.15   vim-tiny                        2:8.2.3995-1ubuntu2.15   xxd                             2:8.2.3995-1ubuntu2.15Ubuntu 20.04 LTS:   vim                             2:8.1.2269-1ubuntu5.21   vim-athena                      2:8.1.2269-1ubuntu5.21   vim-gtk                         2:8.1.2269-1ubuntu5.21   vim-gtk3                        2:8.1.2269-1ubuntu5.21   vim-nox                         2:8.1.2269-1ubuntu5.21   vim-tiny                        2:8.1.2269-1ubuntu5.21   xxd                             2:8.1.2269-1ubuntu5.21Ubuntu 18.04 LTS (Available with Ubuntu Pro):   vim                             2:8.0.1453-1ubuntu1.13+esm7   vim-athena                      2:8.0.1453-1ubuntu1.13+esm7   vim-gtk                         2:8.0.1453-1ubuntu1.13+esm7   vim-gtk3                        2:8.0.1453-1ubuntu1.13+esm7   vim-nox                         2:8.0.1453-1ubuntu1.13+esm7   vim-tiny                        2:8.0.1453-1ubuntu1.13+esm7   xxd                             2:8.0.1453-1ubuntu1.13+esm7Ubuntu 16.04 LTS (Available with Ubuntu Pro):   vim                             2:7.4.1689-3ubuntu1.5+esm22   vim-athena                      2:7.4.1689-3ubuntu1.5+esm22   vim-gtk                         2:7.4.1689-3ubuntu1.5+esm22   vim-gtk3                        2:7.4.1689-3ubuntu1.5+esm22   vim-nox                         2:7.4.1689-3ubuntu1.5+esm22   vim-tiny                        2:7.4.1689-3ubuntu1.5+esm22Ubuntu 14.04 LTS (Available with Ubuntu Pro):   vim                             2:7.4.052-1ubuntu3.1+esm15   vim-athena                      2:7.4.052-1ubuntu3.1+esm15   vim-gtk                         2:7.4.052-1ubuntu3.1+esm15   vim-nox                         2:7.4.052-1ubuntu3.1+esm15   vim-tiny                        2:7.4.052-1ubuntu3.1+esm15In general, a standard system update will make all the necessary changes.References:   https://ubuntu.com/security/notices/USN-6557-1   CVE-2022-1725, CVE-2022-1771, CVE-2022-1886, CVE-2022-1897,   CVE-2022-2000, CVE-2022-2042, CVE-2023-46246, CVE-2023-48231,   CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235,   CVE-2023-48236, CVE-2023-48237, CVE-2023-48706Package Information:   https://launchpad.net/ubuntu/+source/vim/2:9.0.1672-1ubuntu2.2   https://launchpad.net/ubuntu/+source/vim/2:9.0.1000-4ubuntu3.3   https://launchpad.net/ubuntu/+source/vim/2:8.2.3995-1ubuntu2.15   https://launchpad.net/ubuntu/+source/vim/2:8.1.2269-1ubuntu5.21

Related news

Understanding the Red Hat security impact scale

Red Hat uses a four-point impact scale to classify security issues affecting our products. Have you ever asked yourself what it takes and what the requirements are for each point of the scale? We will talk through the highlights of our process in this article.Is this a CVE?First and foremost, what is a CVE? Short for Common Vulnerabilities and Exposures, it is a list of publicly disclosed computer security flaws. Learn more in this Red Hat post.To receive a severity rating, the issue needs to be a CVE. But what does it take to be a CVE? In order to warrant a CVE ID, a vulnerability has to comp

CVE-2023-48706: heap-use-after-free in ex_substitute

Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.

CVE-2023-48236: overflow in get_number

Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-48234: overflow in nv_z_get_count

Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-48232: Floating point Exception in adjust_plines_for_skipcol()

Vim is an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash. This issue has been addressed in commit `cb0b99f0` which has been included in release version 9.0.2107. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-48233: overflow with count for :s command

Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-48237: overflow in shift_line

Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-48235: overflow in ex address parsing

Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-48231: Use-After-Free in win_close()

Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit `25aabc2b` which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-46246: Integer Overflow in :history command

Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.

Red Hat Security Advisory 2023-4053-01

Red Hat Security Advisory 2023-4053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.45. Issues addressed include a code execution vulnerability.

RHSA-2023:4053: Red Hat Security Advisory: OpenShift Container Platform 4.11.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21235: A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands o...

Gentoo Linux Security Advisory 202305-16

Gentoo Linux Security Advisory 202305-16 - Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. Versions less than 9.0.1157 are affected.

Gentoo Linux Security Advisory 202305-16

Gentoo Linux Security Advisory 202305-16 - Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. Versions less than 9.0.1157 are affected.

Gentoo Linux Security Advisory 202305-16

Gentoo Linux Security Advisory 202305-16 - Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. Versions less than 9.0.1157 are affected.

Gentoo Linux Security Advisory 202305-16

Gentoo Linux Security Advisory 202305-16 - Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. Versions less than 9.0.1157 are affected.

Gentoo Linux Security Advisory 202305-16

Gentoo Linux Security Advisory 202305-16 - Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. Versions less than 9.0.1157 are affected.

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

CVE-2022-26730: About the security content of macOS Ventura 13

A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution.

CVE-2022-26730: About the security content of macOS Ventura 13

A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution.

CVE-2022-26730: About the security content of macOS Ventura 13

A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution.

CVE-2022-1725: NULL Pointer Dereference in function vim_regexec_string in vim

NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4959.

Red Hat Security Advisory 2022-6182-01

Red Hat Security Advisory 2022-6182-01 - Openshift Logging Bug Fix Release. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6183-01

Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

RHSA-2022:6271: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.12 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS

Gentoo Linux Security Advisory 202208-32

Gentoo Linux Security Advisory 202208-32 - Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. Versions less than 9.0.0060 are affected.

Gentoo Linux Security Advisory 202208-32

Gentoo Linux Security Advisory 202208-32 - Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. Versions less than 9.0.0060 are affected.

Gentoo Linux Security Advisory 202208-32

Gentoo Linux Security Advisory 202208-32 - Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. Versions less than 9.0.0060 are affected.

Gentoo Linux Security Advisory 202208-32

Gentoo Linux Security Advisory 202208-32 - Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. Versions less than 9.0.0060 are affected.

Red Hat Security Advisory 2022-5942-01

Red Hat Security Advisory 2022-5942-01 - Vim is an updated and improved version of the vi editor. Issues addressed include buffer over-read and out of bounds write vulnerabilities.

RHSA-2022:5942: Red Hat Security Advisory: vim security update

An update for vim is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1785: vim: Out-of-bounds Write * CVE-2022-1897: vim: out-of-bounds write in vim_regsub_both() in regexp.c * CVE-2022-1927: vim: buffer over-read in utf_ptr2char() in mbyte.c

RHSA-2022:5813: Red Hat Security Advisory: vim security update

An update for vim is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1785: vim: Out-of-bounds Write * CVE-2022-1897: vim: out-of-bounds write in vim_regsub_both() in regexp.c * CVE-2022-1927: vim: buffer over-read in utf_ptr2char() in mbyte.c

Ubuntu Security Notice USN-5516-1

Ubuntu Security Notice 5516-1 - It was discovered that Vim incorrectly handled memory access. An attacker could potentially use this issue to cause the corruption of sensitive information, a crash, or arbitrary code execution.

Ubuntu Security Notice USN-5507-1

Ubuntu Security Notice 5507-1 - It was discovered that Vim incorrectly handled memory access. An attacker could potentially use this issue to cause the program to crash, use unexpected values, or execute arbitrary code. It was discovered that Vim incorrectly handled memory access. An attacker could potentially use this issue to cause the corruption of sensitive information, a crash, or arbitrary code execution.

Ubuntu Security Notice USN-5492-1

Ubuntu Security Notice 5492-1 - It was discovered that Vim incorrectly handled memory when opening and searching the contents of certain files. If an attacker could trick a user into opening a specially crafted file, it could cause Vim to crash.

CVE-2022-2042: use after free in skipwhite in vim

Use After Free in GitHub repository vim/vim prior to 8.2.

CVE-2022-2000: Out-of-bounds write in function append_command in vim

Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.

CVE-2022-1897: Out-of-bounds write in function vim_regsub_both in vim

Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.

Packet Storm: Latest News

Ivanti EPM Remote Code Execution