Ubuntu alert USN-7048-2 (vim)
| From: | Vyom Yadav <vyom.yadav@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-7048-2] Vim vulnerability | |
| Date: | Wed, 16 Oct 2024 14:00:04 +0530 | |
| Message-ID: | <d4c3e825-f9f9-442f-9ca3-f2ed0f71b923@canonical.com> |
========================================================================== Ubuntu Security Notice USN-7048-2 October 16, 2024 vim vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS Summary: Vim could be made to crash if it received specially crafted input. Software Description: - vim: Vi IMproved - enhanced vi editor Details: USN-7048-1 fixed a vulnerability in Vim. This update provides the corresponding update for Ubuntu 14.04 LTS. Original advisory details: Suyue Guo discovered that Vim incorrectly handled memory when flushing the typeahead buffer, leading to heap-buffer-overflow. An attacker could possibly use this issue to cause a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS vim 2:7.4.052-1ubuntu3.1+esm19 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7048-2 https://ubuntu.com/security/notices/USN-7048-1 CVE-2024-43802
Attachment: OpenPGP_signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- wnsEABYIACMWIQSV2d7RU755utSnx3O7Ba3EKYsoKQUCZw95jQUDAAAAAAAKCRC7Ba3EKYsoKZBu AQCVeNTGp5bELfVCf0XKra8PBS3uD6RamA+ElEG82JGvgQD/QJFs+R8lI+BJ/LBz3+M9fdaeNP/O jTQKC/N65pbLiwI= =6aQf -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)
