First published: Sun Jun 19 2022(Updated: )
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <8.2.5122 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Apple macOS | <11.7 | |
Apple macOS | >=12.0<12.6 | |
Apple macOS Monterey | <12.6 | 12.6 |
Apple macOS Big Sur | <11.7 | 11.7 |
<13 | 13 | |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0777-1 2:9.1.0861-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2022-2125.
The affected software includes Apple macOS Monterey, Apple macOS Big Sur, Apple macOS Ventura, Ubuntu Vim, and Debian Vim.
The severity of CVE-2022-2125 is not specified in the provided information.
CVE-2022-2125 can lead to a heap-based buffer overflow, which can potentially allow an attacker to execute arbitrary code or cause a denial-of-service.
To fix CVE-2022-2125, it is recommended to update to the latest version of the affected software as provided by the vendor.