CVE-2017-6350

Priority
Description
An integer overflow at an unserialize_uep memory allocation site would
occur for vim before patch 8.0.0378, if it does not properly validate
values for tree length when reading a corrupted undo file, which may lead
to resultant buffer overflows.
Notes
Package
Source: vim (LP Ubuntu Debian)
Upstream:released (2:8.0.0197-3)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2:8.0.1144-1ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (2:8.0.1144-1ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (2:8.0.1144-1ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (2:8.0.1144-1ubuntu1)
Patches:
Upstream:https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75
More Information

Updated: 2019-12-05 19:48:51 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)