
Cloud Vulnerability DB
A community-led vulnerabilities database
A NULL pointer dereference vulnerability was discovered in the vimregexecstring() function at regexp.c:2733 in GitHub repository vim/vim prior to version 8.2.4938. The vulnerability was disclosed on May 12, 2022 and affects the Vim text editor (NVD, Red Hat).
The vulnerability occurs in the vimregexecstring() function when attempting to match a buffer with an invalid pattern. The issue arises when the function tries to process a NULL regprog pointer, which can lead to a crash. This was fixed by adding a NULL pointer check before accessing the regprog (GitHub Commit).
When exploited, this vulnerability can cause a denial of service through application crash when processing specially crafted input (Red Hat).
The vulnerability was patched in Vim version 8.2.4938. Users should upgrade to this version or later. For specific distributions, security updates were released: Fedora 34 (vim-8.2.4975-1.fc34), Fedora 35 (vim-8.2.4975-1.fc35), and Fedora 36 (vim-8.2.4969-1.fc36) (Fedora Updates).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."