UbuntuUpdates.org

Bugs fixes in "vim"

Origin Bug number Title Date fixed
CVE CVE-2022-1771 Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975. 2023-12-14
CVE CVE-2022-1725 NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4959. 2023-12-14
CVE CVE-2023-48237 Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it ma 2023-12-14
CVE CVE-2023-48236 Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is 2023-12-14
CVE CVE-2023-48235 Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens 2023-12-14
CVE CVE-2023-48234 Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is 2023-12-14
CVE CVE-2023-48233 Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with 2023-12-14
CVE CVE-2023-48231 Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond cras 2023-12-14
CVE CVE-2023-46246 Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `sr 2023-12-14
CVE CVE-2022-2000 Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. 2023-12-14
CVE CVE-2022-1897 Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. 2023-12-14
CVE CVE-2022-1771 Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975. 2023-12-14
CVE CVE-2022-1725 NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4959. 2023-12-14
CVE CVE-2023-48237 Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it ma 2023-12-14
CVE CVE-2023-48236 Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is 2023-12-14
CVE CVE-2023-48235 Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens 2023-12-14
CVE CVE-2023-48234 Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is 2023-12-14
CVE CVE-2023-48233 Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with 2023-12-14
CVE CVE-2023-48231 Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond cras 2023-12-14
CVE CVE-2023-46246 Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `sr 2023-12-14



About   -   Send Feedback to @ubuntu_updates