Related Vulnerabilities: CVE-2022-2284  

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.

Description

The MITRE CVE dictionary describes this issue as:

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.

Statement

Red Hat Product Security has rated this issue as having a Low security impact, because the "victim" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/

Red Hat Product Security has rated this issue as having a Low security impact, because the "victim" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.

For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/

Mitigation

Untrusted vim scripts with -s [scriptin] are not recommended to run.

Additional Information

  • Bugzilla 2103872: CVE-2022-2284 vim: out of bounds read in utfc_ptr2len() at mbyte.c
  • CWE-122: Heap-based Buffer Overflow
  • FAQ: Frequently asked questions about CVE-2022-2284