Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Vim | Vim | * | 8.2.4925 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | vim-2:8.0.1763-19.el8_6.2 | * |
Red Hat Enterprise Linux 8 | RedHat | vim-2:8.0.1763-19.el8_6.2 | * |
Red Hat Enterprise Linux 9 | RedHat | vim-2:8.2.2637-16.el9_0.2 | * |
Red Hat Enterprise Linux 9 | RedHat | vim-2:8.2.2637-16.el9_0.2 | * |
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | RedHat | vim-2:8.0.1763-19.el8_6.2 | * |
Vim | Ubuntu | bionic | * |
Vim | Ubuntu | esm-infra/xenial | * |
Vim | Ubuntu | focal | * |
Vim | Ubuntu | impish | * |
Vim | Ubuntu | jammy | * |
Vim | Ubuntu | trusty/esm | * |
Vim | Ubuntu | upstream | * |