Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ USN-4309-1: Vim vulnerabilities

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š USN-4309-1: Vim vulnerabilities


๐Ÿ’ก Newskategorie: Unix Server
๐Ÿ”— Quelle: usn.ubuntu.com

vim vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM

Summary

Several security issues were fixed in Vim.

Software Description

  • vim - Vi IMproved - enhanced vi editor

Details

It was discovered that Vim incorrectly handled certain sources. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS (CVE-2017-1110)

It was discovered that Vim incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. (CVE-2017-5953)

It was discovered that Vim incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.06 LTS. (CVE-2018-20786)

It was discovered that Vim incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 19.10. (CVE-2019-20079)

It was discovered that Vim incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. (CVE-2017-6349, CVE-2017-6350)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
vim - 2:8.1.0875-5ubuntu2.1
vim-common - 2:8.1.0875-5ubuntu2.1
vim-gui-common - 2:8.1.0875-5ubuntu2.1
vim-runtime - 2:8.1.0875-5ubuntu2.1
Ubuntu 18.04 LTS
vim - 2:8.0.1453-1ubuntu1.3
vim-common - 2:8.0.1453-1ubuntu1.3
vim-gui-common - 2:8.0.1453-1ubuntu1.3
vim-runtime - 2:8.0.1453-1ubuntu1.3
Ubuntu 16.04 LTS
vim - 2:7.4.1689-3ubuntu1.4
vim-common - 2:7.4.1689-3ubuntu1.4
vim-gui-common - 2:7.4.1689-3ubuntu1.4
vim-runtime - 2:7.4.1689-3ubuntu1.4
Ubuntu 14.04 ESM
vim - 2:7.4.052-1ubuntu3.1+esm1
vim-common - 2:7.4.052-1ubuntu3.1+esm1
vim-gui-common - 2:7.4.052-1ubuntu3.1+esm1
vim-runtime - 2:7.4.052-1ubuntu3.1+esm1
Ubuntu 12.04 ESM
vim - 2:7.3.429-2ubuntu2.3
vim-common - 2:7.3.429-2ubuntu2.3
vim-gui-common - 2:7.3.429-2ubuntu2.3
vim-runtime - 2:7.3.429-2ubuntu2.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

...



๐Ÿ“Œ CVE-2022-2042 | vim up to 8.1 vim/vim use after free


๐Ÿ“ˆ 37.18 Punkte

๐Ÿ“Œ CVE-2022-1720 | vim prior 8.2.4956 vim/vim grab_file_name buffer overflow


๐Ÿ“ˆ 37.18 Punkte

๐Ÿ“Œ CVE-2022-2946 | vim prior 9.0.0245 vim/vim use after free


๐Ÿ“ˆ 37.18 Punkte

๐Ÿ“Œ Vim prank: alias vim='vim -y'


๐Ÿ“ˆ 37.18 Punkte

๐Ÿ“Œ If Ubuntu is a beginner friendly distro, why does it use vim-tiny despite all the confusion is causes even to regular vim users?


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Vim zipPlugin.vim up to V.21 Mapping shellescape memory corruption


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Vim tar.vim up to V.22 Mapping shellescape memory corruption


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ nnn.vim: Fast and featureful file manager in vim/neovim


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Viter โ€” a Vim-ish terminal emulator. Features Vim-like modes, keybindings, status line and an inline Python interpretator.


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ High CVE-2019-20807: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2021-28832: Vim project VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2000: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2129: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2125: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2183: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Vim.Wasm - Vim Editor Ported To WebAssembly


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ vim-plug: minimalist vim plugin manager


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ High CVE-2019-12735: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Vim Releases 'Killersheep' Game To Demo Two New Features In Vim 8.2


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Opinion: Multiple TMUX Windows/Panes running multiple VIM instances, or Vim with panes?


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2182: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2264: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2287: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2286: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2285: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2284: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2257: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Medium CVE-2022-2304: VIM VIM


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Why Vim Is More than Just an Editor โ€“ Vim Language, Motions, and Modes Explained


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Boot to Vim, Vim as Pid 1


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Vim Key Bindings โ€“ Vim Keys List Reference


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Search for word boundaries in Vim & VSCode Vim


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ USN-4582-1: Vim vulnerabilities


๐Ÿ“ˆ 22.88 Punkte

๐Ÿ“Œ USN-5498-1: Vim vulnerabilities


๐Ÿ“ˆ 22.88 Punkte

๐Ÿ“Œ USN-5507-1: Vim vulnerabilities


๐Ÿ“ˆ 22.88 Punkte











matomo