Bug 2083924 (CVE-2022-1621) - CVE-2022-1621 vim: heap buffer overflow
Summary: CVE-2022-1621 vim: heap buffer overflow
Status: NEW
Alias: CVE-2022-1621
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 2088260 2088261 2088262 2088263 2083927 2083929 2085345
Blocks: 2083930
TreeView+ depends on / blocked
Reported: 2022-05-11 03:36 UTC by Anten Skrabec
Modified: 2022-05-25 10:12 UTC (History)
9 users (show)

Fixed In Version: vim 8.2.4919
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Anten Skrabec 2022-05-11 03:36:08 UTC
Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution.


Comment 1 Anten Skrabec 2022-05-11 03:48:20 UTC
Created vim tracking bugs for this issue:

Affects: fedora-34 [bug 2083927]

Comment 2 Anten Skrabec 2022-05-11 03:58:57 UTC
Created vim tracking bugs for this issue:

Affects: fedora-35 [bug 2083929]

Comment 6 Sandro Bonazzola 2022-05-13 09:55:53 UTC
Hi, can you please elaborate on how is it possible that RHV is considered affected while RHEL is under investigation?
RHV just consume RHEL builds so it's not clear to me how this is possible.

Note You need to log in before you can comment on or make changes to this bug.