USN-7048-1 fixed a vulnerability in Vim. This update provides the corresponding update for Ubuntu 14.04 LTS.
Original advisory details:
Suyue Guo discovered that Vim incorrectly handled memory when flushing the typeahead buffer, leading to heap-buffer-overflow. An attacker could possibly use this issue to cause a denial of service.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-athena" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-athena-dbgsym" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-common" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-common-dbgsym" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-dbg" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-dbgsym" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-doc" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-gnome" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-gnome-dbgsym" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-gtk" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-gtk-dbgsym" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-gui-common" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-lesstif" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-nox" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-nox-dbgsym" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-runtime" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-tiny" }, { "binary_version": "2:7.4.052-1ubuntu3.1+esm19", "binary_name": "vim-tiny-dbgsym" } ] }