USN-5147-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5147-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5147-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5147-1
Related
Published
2021-11-15T13:47:04.686637Z
Modified
2021-11-15T13:47:04.686637Z
Summary
vim vulnerabilities
Details

It was discovered that Vim incorrectly handled permissions on the .swp file. A local attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 14.04 ESM. (CVE-2017-17087)

It was discovered that Vim incorrectly handled restricted mode. A local attacker could possibly use this issue to bypass restricted mode and execute arbitrary commands. Note: This update only makes executing shell commands more difficult. Restricted mode should not be considered a complete security measure. This issue only affected Ubuntu 14.04 ESM. (CVE-2019-20807)

Brian Carpenter discovered that vim incorrectly handled memory when opening certain files. If a user was tricked into opening a specially crafted file, a remote attacker could crash the application, leading to a denial of service, or possible execute arbitrary code with user privileges. This issue only affected Ubuntu 20.04 LTS, Ubuntu 21.04 and Ubuntu 21.10. (CVE-2021-3872)

It was discovered that vim incorrectly handled memory when opening certain files. If a user was tricked into opening a specially crafted file, a remote attacker could crash the application, leading to a denial of service, or possible execute arbitrary code with user privileges. (CVE-2021-3903)

It was discovered that vim incorrectly handled memory when opening certain files. If a user was tricked into opening a specially crafted file, a remote attacker could crash the application, leading to a denial of service, or possible execute arbitrary code with user privileges. (CVE-2021-3927)

It was discovered that vim incorrectly handled memory when opening certain files. If a user was tricked into opening a specially crafted file, a remote attacker could crash the application, leading to a denial of service, or possible execute arbitrary code with user privileges. (CVE-2021-3928)

References

Affected packages

Ubuntu:Pro:14.04:LTS / vim

Package

Name
vim

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:7.4.052-1ubuntu3.1+esm4

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "vim-doc": "2:7.4.052-1ubuntu3.1+esm4",
            "vim-gnome": "2:7.4.052-1ubuntu3.1+esm4",
            "vim-gui-common": "2:7.4.052-1ubuntu3.1+esm4",
            "vim-lesstif": "2:7.4.052-1ubuntu3.1+esm4",
            "vim-tiny": "2:7.4.052-1ubuntu3.1+esm4",
            "vim": "2:7.4.052-1ubuntu3.1+esm4",
            "vim-common": "2:7.4.052-1ubuntu3.1+esm4",
            "vim-runtime": "2:7.4.052-1ubuntu3.1+esm4",
            "vim-athena": "2:7.4.052-1ubuntu3.1+esm4",
            "vim-gtk": "2:7.4.052-1ubuntu3.1+esm4",
            "vim-nox": "2:7.4.052-1ubuntu3.1+esm4"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / vim

Package

Name
vim

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:7.4.1689-3ubuntu1.5+esm3

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "vim-gui-common": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-gtk-py2": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-tiny": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-gtk": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-athena": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-nox": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-doc": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-gnome": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-gnome-py2": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-athena-py2": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-common": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-gtk3-py2": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-gtk3": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-nox-py2": "2:7.4.1689-3ubuntu1.5+esm3",
            "vim-runtime": "2:7.4.1689-3ubuntu1.5+esm3"
        }
    ]
}

Ubuntu:18.04:LTS / vim

Package

Name
vim

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:8.0.1453-1ubuntu1.7

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "vim-doc": "2:8.0.1453-1ubuntu1.7",
            "vim-athena": "2:8.0.1453-1ubuntu1.7",
            "vim-gnome": "2:8.0.1453-1ubuntu1.7",
            "vim-gui-common": "2:8.0.1453-1ubuntu1.7",
            "vim": "2:8.0.1453-1ubuntu1.7",
            "vim-tiny": "2:8.0.1453-1ubuntu1.7",
            "vim-common": "2:8.0.1453-1ubuntu1.7",
            "vim-runtime": "2:8.0.1453-1ubuntu1.7",
            "vim-gtk3": "2:8.0.1453-1ubuntu1.7",
            "vim-gtk": "2:8.0.1453-1ubuntu1.7",
            "xxd": "2:8.0.1453-1ubuntu1.7",
            "vim-nox": "2:8.0.1453-1ubuntu1.7"
        }
    ]
}

Ubuntu:20.04:LTS / vim

Package

Name
vim

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:8.1.2269-1ubuntu5.4

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "vim-doc": "2:8.1.2269-1ubuntu5.4",
            "vim-athena": "2:8.1.2269-1ubuntu5.4",
            "vim-gui-common": "2:8.1.2269-1ubuntu5.4",
            "vim": "2:8.1.2269-1ubuntu5.4",
            "vim-tiny": "2:8.1.2269-1ubuntu5.4",
            "vim-common": "2:8.1.2269-1ubuntu5.4",
            "vim-runtime": "2:8.1.2269-1ubuntu5.4",
            "vim-gtk3": "2:8.1.2269-1ubuntu5.4",
            "vim-gtk": "2:8.1.2269-1ubuntu5.4",
            "xxd": "2:8.1.2269-1ubuntu5.4",
            "vim-nox": "2:8.1.2269-1ubuntu5.4"
        }
    ]
}