Severity: High
Date : 2022-04-15
CVE-ID : CVE-2022-1154 CVE-2022-1160
Package : gvim
Type : arbitrary code execution
Remote : No
Link : https://security.archlinux.org/AVG-2662
The package gvim before version 8.2.4651-1 is vulnerable to arbitrary
code execution.
Upgrade to 8.2.4651-1.
The problems have been fixed upstream in version 8.2.4651.
None.
Use after free in utf_ptr2char in vim prior to 8.2.4646 while using
buffer line after it has been freed in old regexp engine.
“source” can read past end of copied line resulting in heap buffer
overflow in get_one_sourceline in vim prior to 8.2.4647
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://github.com/vim/vim/commit/2bdad6126778f907c0b98002bfebf0e611a3f5db
https://huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c/
https://security.archlinux.org/CVE-2022-1154
https://security.archlinux.org/CVE-2022-1160
github.com/vim/vim/commit/2bdad6126778f907c0b98002bfebf0e611a3f5db
github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c/
security.archlinux.org/AVG-2662
security.archlinux.org/CVE-2022-1154
security.archlinux.org/CVE-2022-1160