Bug 2102153 (CVE-2022-2182) - CVE-2022-2182 vim: heap-based buffer overflow through parse_cmd_address() in function utf_ptr2char
Summary: CVE-2022-2182 vim: heap-based buffer overflow through parse_cmd_address() in ...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2022-2182
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2102154 2121234 2121235
Blocks: 2102155
TreeView+ depends on / blocked
 
Reported: 2022-06-29 12:08 UTC by Marian Rehak
Modified: 2022-08-25 18:07 UTC (History)
3 users (show)

Fixed In Version: vim 8.2.5150
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-08-25 18:07:32 UTC


Attachments (Terms of Use)

Description Marian Rehak 2022-06-29 12:08:30 UTC
Heap-based buffer overflow capable of crashing software, modify memory, and possible remote execution.

Reference:

https://github.com/vim/vim/commit/f7c7c3fad6d2135d558f3b36d0d1a943118aeb5e
https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8

Comment 1 Marian Rehak 2022-06-29 12:08:45 UTC
Created vim tracking bugs for this issue:

Affects: fedora-all [bug 2102154]


Note You need to log in before you can comment on or make changes to this bug.