UbuntuUpdates.org

Bugs fixes in "vim"

Origin Bug number Title Date fixed
Launchpad 2064687 Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current 2024-05-03
Launchpad 2064687 Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current 2024-05-03
Launchpad 2064687 Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current 2024-05-03
Launchpad 2064687 Add Oracular as a known Ubuntu distribution, make Debian and Ubuntu codenames current 2024-05-03
CVE CVE-2024-22667 Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down 2024-03-18
CVE CVE-2024-22667 Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down 2024-03-18
CVE CVE-2024-22667 Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down 2024-03-18
CVE CVE-2024-22667 Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down 2024-03-18
CVE CVE-2024-22667 Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down 2024-03-18
CVE CVE-2024-22667 Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down 2024-03-18
CVE CVE-2024-22667 Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down 2024-03-18
CVE CVE-2024-22667 Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down 2024-03-18
CVE CVE-2023-48237 Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it ma 2023-12-14
CVE CVE-2023-48236 Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is 2023-12-14
CVE CVE-2023-48235 Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens 2023-12-14
CVE CVE-2023-48234 Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is 2023-12-14
CVE CVE-2023-48233 Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with 2023-12-14
CVE CVE-2023-48231 Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond cras 2023-12-14
CVE CVE-2023-46246 Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `sr 2023-12-14
CVE CVE-2022-2000 Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. 2023-12-14



About   -   Send Feedback to @ubuntu_updates