CVE-2022-1735
Summary
| CVE | CVE-2022-1735 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-05-17 19:15:00 UTC |
| Updated | 2023-05-03 12:15:00 UTC |
| Description | Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969. |
Risk And Classification
Problem Types: CWE-120
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Full Disclosure: APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 | FULLDISC | seclists.org | |
| Buffer Over-read in function utfc_ptr2len vulnerability found in vim | CONFIRM | huntr.dev | |
| Vim, gVim: Multiple Vulnerabilities (GLSA 202208-32) — Gentoo security | GENTOO | security.gentoo.org | |
| About the security content of macOS Ventura 13 - Apple Support | CONFIRM | support.apple.com | |
| Vim, gVim: Multiple Vulnerabilities (GLSA 202305-16) — Gentoo security | GENTOO | security.gentoo.org | |
| Full Disclosure: APPLE-SA-2022-10-24-2 macOS Ventura 13 | FULLDISC | seclists.org | |
| patch 8.2.4969: changing text in Visual mode may cause invalid memory… · vim/vim@7ce5b2b · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 182263 Debian Security Update for vim (CVE-2022-1735)
- 199271 Ubuntu Security Notification for Vim Vulnerabilities (USN-5995-1)
- 296082 Oracle Solaris 11.4 Support Repository Update (SRU) 48.126.1 Missing (CPUJUL2022)
- 354009 Amazon Linux Security Advisory for vim : ALAS2-2022-1829
- 354033 Amazon Linux Security Advisory for vim : ALAS-2022-1628
- 354356 Amazon Linux Security Advisory for vim : ALAS2022-2022-116
- 354497 Amazon Linux Security Advisory for vim : ALAS2022-2022-155
- 354585 Amazon Linux Security Advisory for vim : ALAS-2022-155
- 355135 Amazon Linux Security Advisory for vim : ALAS2023-2023-098
- 672048 EulerOS Security Update for vim (EulerOS-SA-2022-2282)
- 672056 EulerOS Security Update for vim (EulerOS-SA-2022-2263)
- 672072 EulerOS Security Update for vim (EulerOS-SA-2022-2250)
- 672076 EulerOS Security Update for vim (EulerOS-SA-2022-2237)
- 672105 EulerOS Security Update for vim (EulerOS-SA-2022-2307)
- 672124 EulerOS Security Update for vim (EulerOS-SA-2022-2336)
- 672223 EulerOS Security Update for vim (EulerOS-SA-2022-2639)
- 710607 Gentoo Linux Vim, gVim Multiple Vulnerabilities (GLSA 202208-32)
- 710718 Gentoo Linux Vim, gVim Multiple Vulnerabilities (GLSA 202305-16)
- 752246 SUSE Enterprise Linux Security Update for vim (SUSE-SU-2022:2102-1)
- 753066 SUSE Enterprise Linux Security Update for vim (SUSE-SU-2022:4619-1)
- 901990 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9772)
- 902000 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9787)
- 902183 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9772-1)
- 902245 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9787-1)