CVE-2022-1796
Published on: Not Yet Published
Last Modified on: 05/03/2023 12:15:00 PM UTC
CVE-2022-1796 - advisory for f6739b58-49f9-4056-a843-bf76bbc1253e
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Vim from Vim contain the following vulnerability:
Use After Free in GitHub repository vim/vim prior to 8.2.4979.
- CVE-2022-1796 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
vim - vim/vim version < 8.2.4979
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 6.8 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
heap-use-after-free in function find_pattern_in_path vulnerability found in vim | huntr.dev text/html |
![]() |
Vim, gVim: Multiple Vulnerabilities (GLSA 202208-32) — Gentoo security | security.gentoo.org text/html |
![]() |
Vim, gVim: Multiple Vulnerabilities (GLSA 202305-16) — Gentoo security | security.gentoo.org text/html |
![]() |
patch 8.2.4979: accessing freed memory when line is flushed · vim/[email protected] · GitHub | github.com application/octet-stream |
![]() |
Related QID Numbers
- 199271 Ubuntu Security Notification for Vim Vulnerabilities (USN-5995-1)
- 296082 Oracle Solaris 11.4 Support Repository Update (SRU) 48.126.1 Missing (CPUJUL2022)
- 354009 Amazon Linux Security Advisory for vim : ALAS2-2022-1829
- 354033 Amazon Linux Security Advisory for vim : ALAS-2022-1628
- 354356 Amazon Linux Security Advisory for vim : ALAS2022-2022-116
- 354497 Amazon Linux Security Advisory for vim : ALAS2022-2022-155
- 354585 Amazon Linux Security Advisory for vim : ALAS-2022-155
- 355135 Amazon Linux Security Advisory for vim : ALAS2023-2023-098
- 502800 Alpine Linux Security Update for vim
- 672048 EulerOS Security Update for vim (EulerOS-SA-2022-2282)
- 672056 EulerOS Security Update for vim (EulerOS-SA-2022-2263)
- 672072 EulerOS Security Update for vim (EulerOS-SA-2022-2250)
- 672076 EulerOS Security Update for vim (EulerOS-SA-2022-2237)
- 672105 EulerOS Security Update for vim (EulerOS-SA-2022-2307)
- 672124 EulerOS Security Update for vim (EulerOS-SA-2022-2336)
- 672223 EulerOS Security Update for vim (EulerOS-SA-2022-2639)
- 710607 Gentoo Linux Vim, gVim Multiple Vulnerabilities (GLSA 202208-32)
- 710718 Gentoo Linux Vim, gVim Multiple Vulnerabilities (GLSA 202305-16)
- 752246 SUSE Enterprise Linux Security Update for vim (SUSE-SU-2022:2102-1)
- 753066 SUSE Enterprise Linux Security Update for vim (SUSE-SU-2022:4619-1)
- 901998 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9784)
- 902001 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9791)
- 902202 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9784-1)
- 902255 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9791-1)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Vim | Vim | All | All | All | All |
- cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
Use After Free in github.com/vim/vim (CVE-2022-1796) reported by jieyongma - Patch: github.com/vim/vim/commit…… twitter.com/i/web/status/1… | 2022-05-18 16:01:44 |
![]() |
CVE-2022-1796 : Use After Free in GitHub repository vim/vim prior to 8.2.... cve.report/CVE-2022-1796 | 2022-05-19 15:40:55 |
![]() |
CVE-2022-1796 | 2022-05-19 16:39:02 |