First published: Mon Mar 18 2024(Updated: )
Zhen Zhou discovered that Vim did not properly manage memory. An attacker could possibly use this issue to cause a denial of service
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/vim | <2:9.0.1672-1ubuntu2.3 | 2:9.0.1672-1ubuntu2.3 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/vim | <2:8.2.3995-1ubuntu2.16 | 2:8.2.3995-1ubuntu2.16 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/vim | <2:8.1.2269-1ubuntu5.22 | 2:8.1.2269-1ubuntu5.22 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/vim | <2:8.0.1453-1ubuntu1.13+esm8 | 2:8.0.1453-1ubuntu1.13+esm8 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/vim | <2:7.4.1689-3ubuntu1.5+esm23 | 2:7.4.1689-3ubuntu1.5+esm23 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/vim | <2:7.4.052-1ubuntu3.1+esm16 | 2:7.4.052-1ubuntu3.1+esm16 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6698-1 is classified as a denial of service vulnerability.
To fix USN-6698-1, you should update the Vim package to the patched versions specified in the advisory.
Affected versions of Ubuntu include 23.10, 22.04, 20.04, 18.04, 16.04, and 14.04.
The impacted versions of Vim include 2:9.0.1672-1ubuntu2.3, 2:8.2.3995-1ubuntu2.16, and earlier versions down to 2:7.4.052-1ubuntu3.1+esm16.
The vulnerability USN-6698-1 was discovered by Zhen Zhou.