ALAS-2017-809

Description

An integer overflow flaw was found in the way vim handled tree length values when reading an undo file. This bug could result in vim crashing when trying to process corrupted undo files. (CVE-2017-6350 )An integer overflow flaw was found in the way vim handled undo files. This bug could result in vim crashing when trying to process corrupted undo files.(CVE-2017-6349 )vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow. (CVE-2017-5953 )

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Package Patched in
vim vim-8.0.0503-1.45.amzn1.src
vim-common vim-common-8.0.0503-1.45.amzn1.x86_64
vim-common vim-common-8.0.0503-1.45.amzn1.i686
vim-debuginfo vim-debuginfo-8.0.0503-1.45.amzn1.i686
vim-debuginfo vim-debuginfo-8.0.0503-1.45.amzn1.x86_64
vim-enhanced vim-enhanced-8.0.0503-1.45.amzn1.x86_64
vim-enhanced vim-enhanced-8.0.0503-1.45.amzn1.i686
vim-filesystem vim-filesystem-8.0.0503-1.45.amzn1.i686
vim-filesystem vim-filesystem-8.0.0503-1.45.amzn1.x86_64
vim-minimal vim-minimal-8.0.0503-1.45.amzn1.x86_64
vim-minimal vim-minimal-8.0.0503-1.45.amzn1.i686