First published: Sat Jul 02 2022(Updated: )
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <9.0.0017 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0967-2 |
Fedora | =35 | |
Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this heap-based buffer overflow is CVE-2022-2284.
The severity level of CVE-2022-2284 has not been specified.
Software versions prior to 9.0 of the GitHub repository vim/vim are affected by CVE-2022-2284.
To fix the heap-based buffer overflow in vim/vim, update to version 9.0 or later of the software.
You can find more information about CVE-2022-2284 at the following references: [reference 1](https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874), [reference 2](https://github.com/vim/vim/commit/3d51ce18ab1be4f9f6061568a4e7fabf00b21794), [reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/).