First published: Sun Feb 13 2022(Updated: )
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <8.2.4359 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Apple macOS | <13.0 | |
<13 | 13 | |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0777-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of the Vim vulnerability is CVE-2022-0572.
The title of the Vim vulnerability is 'Multiple issues were addressed by updating Vim.'
The Vim vulnerability is a heap-based buffer overflow in the GitHub repository vim/vim prior to version 8.2.
The affected software for the Vim vulnerability includes Ubuntu, macOS Ventura, and Debian with specific versions of the Vim package.
To fix the Vim vulnerability, update the Vim package to version 8.2.4359 or higher on Ubuntu, macOS Ventura to version 13, or Vim package to specific versions on Debian.