CVE Vulnerabilities

CVE-2022-1629

Buffer Over-read

Published: May 10, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.8 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution

Weakness

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

Affected Software

NameVendorStart VersionEnd Version
VimVim*8.2.4925 (excluding)
Red Hat Enterprise Linux 8RedHatvim-2:8.0.1763-19.el8_6.2*
Red Hat Enterprise Linux 8RedHatvim-2:8.0.1763-19.el8_6.2*
Red Hat Enterprise Linux 9RedHatvim-2:8.2.2637-16.el9_0.2*
Red Hat Enterprise Linux 9RedHatvim-2:8.2.2637-16.el9_0.2*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8RedHatvim-2:8.0.1763-19.el8_6.2*
VimUbuntubionic*
VimUbuntuesm-infra-legacy/trusty*
VimUbuntuesm-infra/bionic*
VimUbuntuesm-infra/focal*
VimUbuntuesm-infra/xenial*
VimUbuntufocal*
VimUbuntuimpish*
VimUbuntujammy*
VimUbuntutrusty/esm*
VimUbuntuupstream*

References