CVE-2022-3705

A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Jan/19 Third Party Advisory
https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/
https://security.gentoo.org/glsa/202305-16
https://security.netapp.com/advisory/ntap-20221223-0004/ Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
https://vuldb.com/?id.212324 Permissions Required Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/19 Third Party Advisory
https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/
https://security.gentoo.org/glsa/202305-16
https://security.netapp.com/advisory/ntap-20221223-0004/ Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
https://vuldb.com/?id.212324 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.0
References () http://seclists.org/fulldisclosure/2023/Jan/19 - Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jan/19 - Third Party Advisory
References () https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731 - Patch, Third Party Advisory () https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/ -
References () https://security.gentoo.org/glsa/202305-16 - () https://security.gentoo.org/glsa/202305-16 -
References () https://security.netapp.com/advisory/ntap-20221223-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20221223-0004/ - Third Party Advisory
References () https://support.apple.com/kb/HT213605 - Third Party Advisory () https://support.apple.com/kb/HT213605 - Third Party Advisory
References () https://vuldb.com/?id.212324 - Permissions Required, Third Party Advisory () https://vuldb.com/?id.212324 - Permissions Required, Third Party Advisory

07 Nov 2023, 03:51

Type Values Removed Values Added
CWE CWE-416
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/', 'name': 'FEDORA-2022-06e4f1dd58', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/', 'name': 'FEDORA-2022-4bc60c32a2', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/', 'name': 'FEDORA-2022-3d354ef0fb', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/ -

Information

Published : 2022-10-26 20:15

Updated : 2024-11-21 07:20


NVD link : CVE-2022-3705

Mitre link : CVE-2022-3705

CVE.ORG link : CVE-2022-3705


JSON object : View

Products Affected

netapp

  • active_iq_unified_manager

debian

  • debian_linux

fedoraproject

  • fedora

vim

  • vim
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-416

Use After Free