{"id":"USN-5247-1","summary":"vim vulnerabilities","details":"It was discovered that vim incorrectly handled parsing of filenames in its\nsearch functionality. If a user was tricked into opening a specially crafted\nfile, an attacker could crash the application, leading to a denial of\nservice. This issue only affected Ubuntu 21.10. (CVE-2021-3973)\n\nIt was discovered that vim incorrectly handled memory when opening and\nsearching the contents of certain files. If a user was tricked into opening\na specially crafted file, an attacker could crash the application, leading to\na denial of service, or possibly achieve code execution with user privileges.\nThis issue only affected Ubuntu 20.04 LTS and Ubuntu 21.10. (CVE-2021-3974)\n\nIt was discovered that vim incorrectly handled memory when opening and editing\ncertain files. If a user was tricked into opening a specially crafted file, an\nattacker could crash the application, leading to a denial of service, or\npossibly achieve code execution with user privileges. (CVE-2021-3984)\n\nIt was discovered that vim incorrectly handled memory when opening and editing\ncertain files. If a user was tricked into opening a specially crafted file, an\nattacker could crash the application, leading to a denial of service, or\npossibly achieve code execution with user privileges. (CVE-2021-4019)\n\nIt was discovered that vim incorrectly handled memory when opening and editing\ncertain files. If a user was tricked into opening a specially crafted file, an\nattacker could crash the application, leading to a denial of service, or\npossibly achieve code execution with user privileges.(CVE-2021-4069)\n","modified":"2026-02-10T04:42:25Z","published":"2022-01-27T06:37:23Z","related":["UBUNTU-CVE-2021-3973","UBUNTU-CVE-2021-3974","UBUNTU-CVE-2021-3984","UBUNTU-CVE-2021-4019","UBUNTU-CVE-2021-4069"],"upstream":["CVE-2021-3973","CVE-2021-3974","CVE-2021-3984","CVE-2021-4019","CVE-2021-4069","UBUNTU-CVE-2021-3973","UBUNTU-CVE-2021-3974","UBUNTU-CVE-2021-3984","UBUNTU-CVE-2021-4019","UBUNTU-CVE-2021-4069"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5247-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3973"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3974"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3984"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4019"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4069"}],"affected":[{"package":{"name":"vim","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/vim@2:8.0.1453-1ubuntu1.8?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:8.0.1453-1ubuntu1.8"}]}],"versions":["2:8.0.0197-4ubuntu5","2:8.0.1144-1ubuntu1","2:8.0.1401-1ubuntu1","2:8.0.1401-1ubuntu2","2:8.0.1401-1ubuntu3","2:8.0.1453-1ubuntu1","2:8.0.1453-1ubuntu1.1","2:8.0.1453-1ubuntu1.3","2:8.0.1453-1ubuntu1.4","2:8.0.1453-1ubuntu1.6","2:8.0.1453-1ubuntu1.7"],"ecosystem_specific":{"binaries":[{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim-athena"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim-common"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim-gnome"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim-gtk"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim-gtk3"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim-gui-common"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim-nox"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim-runtime"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"vim-tiny"},{"binary_version":"2:8.0.1453-1ubuntu1.8","binary_name":"xxd"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5247-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-3973"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-3974"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3984"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-4019"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-4069"}]}}},{"package":{"name":"vim","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/vim@2:8.1.2269-1ubuntu5.6?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:8.1.2269-1ubuntu5.6"}]}],"versions":["2:8.1.0875-5ubuntu2","2:8.1.0875-5ubuntu3","2:8.1.0875-5ubuntu4","2:8.1.2269-1ubuntu1","2:8.1.2269-1ubuntu4","2:8.1.2269-1ubuntu5","2:8.1.2269-1ubuntu5.3","2:8.1.2269-1ubuntu5.4"],"ecosystem_specific":{"binaries":[{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"vim"},{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"vim-athena"},{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"vim-common"},{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"vim-gtk"},{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"vim-gtk3"},{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"vim-gui-common"},{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"vim-nox"},{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"vim-runtime"},{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"vim-tiny"},{"binary_version":"2:8.1.2269-1ubuntu5.6","binary_name":"xxd"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5247-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-3973"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-3974"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3984"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-4019"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-4069"}]}}}],"schema_version":"1.7.3"}