vim is vulnerable to a heap-based out-of-bounds read when running an arbitrary malicious script. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0213 http://seclists.org/oss-sec/2022/q1/40 http://www.openwall.com/lists/oss-security/2022/01/15/1 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213 https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26 https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
Created vim tracking bugs for this issue: Affects: fedora-all [bug 2044142]
Marked services affected/delegated. Affected code is present, however impact is low and actual occurrence of flaw is unlikely at best.