First published: Sun Sep 25 2022(Updated: )
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim | <9.0.0577 | |
Fedora | =35 | |
Fedora | =36 | |
Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3296 is a stack-based buffer overflow vulnerability in the GitHub repository vim/vim prior to version 9.0.0577.
CVE-2022-3296 has a severity keyword of 'high' and a severity value of 7.8.
The Vim Vim repository prior to version 9.0.0577 and Fedora versions 35, 36, and 37 are affected by CVE-2022-3296.
To fix CVE-2022-3296, make sure to update to Vim version 9.0.0577 or later, or update to a patched version of Fedora.
Yes, you can find references for CVE-2022-3296 at the following links: [GitHub commit](https://github.com/vim/vim/commit/96b9bf8f74af8abf1e30054f996708db7dc285be), [Huntr project](https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077), [Fedora mailing list](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/).