vim is vulnerable to Heap-based Buffer Overflow
References
Link | Resource |
---|---|
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 | Patch Third Party Advisory |
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2022/01/15/1 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html | Mailing List Third Party Advisory |
Configurations
Information
Published : 2021-10-27 14:15
Updated : 2023-01-19 18:03
NVD link : CVE-2021-3903
Mitre link : CVE-2021-3903
JSON object : View
CWE
CWE-122
Heap-based Buffer Overflow
Products Affected
debian
- debian_linux
vim
- vim
fedoraproject
- fedora