CVE-2022-3705

A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Jan/19 Third Party Advisory
https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/
https://security.gentoo.org/glsa/202305-16
https://security.netapp.com/advisory/ntap-20221223-0004/ Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
https://vuldb.com/?id.212324 Permissions Required Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/19 Third Party Advisory
https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/
https://security.gentoo.org/glsa/202305-16
https://security.netapp.com/advisory/ntap-20221223-0004/ Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
https://vuldb.com/?id.212324 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*

History

No history.

Information

Published : 2022-10-26 20:15

Updated : 2024-11-21 07:20


NVD link : CVE-2022-3705

Mitre link : CVE-2022-3705

CVE.ORG link : CVE-2022-3705


JSON object : View

Products Affected

vim

  • vim

netapp

  • active_iq_unified_manager

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-416

Use After Free