First published: Mon Feb 10 2025(Updated: )
It was discovered that Vim incorrectly handled certain internal calls when scrolling a window. An attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/vim | <2:9.1.0496-1ubuntu6.4 | 2:9.1.0496-1ubuntu6.4 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/vim | <2:8.2.3995-1ubuntu2.23 | 2:8.2.3995-1ubuntu2.23 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/vim | <2:8.1.2269-1ubuntu5.31 | 2:8.1.2269-1ubuntu5.31 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7261-1 is classified as a denial of service vulnerability.
To fix USN-7261-1, update to the patched versions of Vim: 2:9.1.0496-1ubuntu6.4, 2:8.2.3995-1ubuntu2.23, or 2:8.1.2269-1ubuntu5.31 depending on your Ubuntu version.
USN-7261-1 affects Ubuntu 20.04, 22.04, and 24.10 with specific vulnerable versions of Vim.
USN-7261-1 does not indicate that it can be exploited remotely, but it can lead to denial of service if an attacker has access.
The impacted product by USN-7261-1 is Vim, which is bundled with Ubuntu distributions.