Bug 1199435 (CVE-2022-1621) - VUL-0: CVE-2022-1621: vim: heap buffer overflow
Summary: VUL-0: CVE-2022-1621: vim: heap buffer overflow
Status: RESOLVED INVALID
Alias: CVE-2022-1621
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Zoltan Balogh
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/331173/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-05-11 11:20 UTC by Thomas Leroy
Modified: 2022-05-11 11:21 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Leroy 2022-05-11 11:20:04 UTC
rh#2083924

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution.

https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2083924
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1621
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
Comment 1 Thomas Leroy 2022-05-11 11:21:04 UTC
No crash on our codestreams.