vim is vulnerable to heap-based buffer overflow. An out-of-bounds write vulnerability in vim_regsub_both()
function in the src/regexp.c
file allows remote attackers to cause an application crash, possibly reading and modifying some amount of memory contents.
CPE | Name | Operator | Version |
---|---|---|---|
vim:sid | eq | 2:8.2.1913-1+b2 | |
vim:sid | eq | 2:8.2.2434-3 | |
vim:sid | eq | 2:8.2.1913-1+b2 | |
vim:sid | eq | 2:8.2.2434-3 |
seclists.org/fulldisclosure/2022/Oct/28
seclists.org/fulldisclosure/2022/Oct/41
github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
lists.debian.org/debian-lts-announce/2022/11/msg00032.html
lists.fedoraproject.org/archives/list/[email protected]/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
security-tracker.debian.org/tracker/CVE-2022-1942
security.gentoo.org/glsa/202208-32
security.gentoo.org/glsa/202305-16
support.apple.com/kb/HT213488