Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.
References
Configurations
History
04 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Nov 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Nov 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
05 Feb 2025, 17:29
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fedoraproject fedora
Fedoraproject |
|
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/ - Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/ - Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20240223-0008/ - Third Party Advisory | |
| CPE | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
21 Nov 2024, 08:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt - Exploit, Third Party Advisory | |
| References | () https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47 - Patch | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/ - | |
| References | () https://security.netapp.com/advisory/ntap-20240223-0008/ - |
23 Feb 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
15 Feb 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
15 Feb 2024, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
14 Feb 2024, 19:49
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:* | |
| First Time |
Vim
Vim vim |
|
| CWE | CWE-787 | |
| References | () https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt - Exploit, Third Party Advisory | |
| References | () https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47 - Patch |
05 Feb 2024, 13:54
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
05 Feb 2024, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-05 08:15
Updated : 2025-11-04 22:15
NVD link : CVE-2024-22667
Mitre link : CVE-2024-22667
CVE.ORG link : CVE-2024-22667
JSON object : View
Products Affected
fedoraproject
- fedora
vim
- vim
CWE
CWE-787
Out-of-bounds Write
