CVE-2017-6349

Priority
Description
An integer overflow at a u_read_undo memory allocation site would occur for
vim before patch 8.0.0377, if it does not properly validate values for tree
length when reading a corrupted undo file, which may lead to resultant
buffer overflows.
Assigned-to
leosilva
Notes
Package
Source: vim (LP Ubuntu Debian)
Upstream:released (2:8.0.0197-3)
Ubuntu 12.04 ESM (Precise Pangolin):released (2:7.3.429-2ubuntu2.3)
Ubuntu 14.04 ESM (Trusty Tahr):released (2:7.4.052-1ubuntu3.1+esm1)
Ubuntu 16.04 LTS (Xenial Xerus):released (2:7.4.1689-3ubuntu1.4)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2:8.0.1144-1ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (2:8.0.1144-1ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (2:8.0.1144-1ubuntu1)
Patches:
Upstream:https://github.com/vim/vim/commit/3eb1637b1bba19519885dd6d377bd5596e91d22c
More Information

Updated: 2020-03-23 17:21:17 UTC (commit 1701944719aec0263f0e0301d2f99cf717a0b469)