CVE-2018-20786

NameCVE-2018-20786
Descriptionlibvterm through 0+bzr726, as used in Vim and other products, mishandles certain out-of-memory conditions, leading to a denial of service (application crash), related to screen.c, state.c, and vterm.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvterm (PTS)bookworm, bullseye0.1.4-1vulnerable
sid, trixie0.3.3-3vulnerable
vim (PTS)bullseye2:8.2.2434-3+deb11u1fixed
bookworm2:9.0.1378-2fixed
sid, trixie2:9.1.0861-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvtermsource(unstable)(unfixed)unimportant
vimsourcejessie(not affected)
vimsourcestretch(not affected)
vimsource(unstable)2:8.1.0693-1unimportant

Notes

[stretch] - vim <not-affected> (Vulnerable code introduced later)
[jessie] - vim <not-affected> (Vulnerable code introduced later)
Introduced by: https://github.com/vim/vim/commit/e4f25e4a8db2c8a8a71a4ba2a68540b3ab341e42 (v8.0.0693)
Fixed by: https://github.com/vim/vim/commit/cd929f7ba8cc5b6d6dcf35c8b34124e969fed6b8 (v8.1.0633)
MISC:https://github.com/vim/vim/issues/3711
No security impact

Search for package or bug name: Reporting problems