CVE-2017-6349

Priority
Description
An integer overflow at a u_read_undo memory allocation site would occur for
vim before patch 8.0.0377, if it does not properly validate values for tree
length when reading a corrupted undo file, which may lead to resultant
buffer overflows.
Notes
Package
Source: vim (LP Ubuntu Debian)
Upstream:released (2:8.0.0197-3)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2:8.0.1144-1ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (2:8.0.1144-1ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (2:8.0.1144-1ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (2:8.0.1144-1ubuntu1)
Patches:
Upstream:https://github.com/vim/vim/commit/3eb1637b1bba19519885dd6d377bd5596e91d22c
More Information

Updated: 2019-12-05 19:48:51 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)