{"id":"USN-5498-1","summary":"vim vulnerabilities","details":"It was discovered that Vim incorrectly handled memory when opening certain\nfiles. If an attacker could trick a user into opening a specially crafted\nfile, it could cause Vim to crash, or possible execute arbitrary code.\n","modified":"2026-02-10T04:42:40Z","published":"2022-06-30T14:54:40Z","related":["UBUNTU-CVE-2022-0413","UBUNTU-CVE-2022-1629","UBUNTU-CVE-2022-1733","UBUNTU-CVE-2022-1735","UBUNTU-CVE-2022-1785","UBUNTU-CVE-2022-1796","UBUNTU-CVE-2022-1851","UBUNTU-CVE-2022-1898"],"upstream":["CVE-2022-0413","CVE-2022-1629","CVE-2022-1733","CVE-2022-1735","CVE-2022-1785","CVE-2022-1796","CVE-2022-1851","CVE-2022-1898","UBUNTU-CVE-2022-0413","UBUNTU-CVE-2022-1629","UBUNTU-CVE-2022-1733","UBUNTU-CVE-2022-1735","UBUNTU-CVE-2022-1785","UBUNTU-CVE-2022-1796","UBUNTU-CVE-2022-1851","UBUNTU-CVE-2022-1898"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5498-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0413"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1629"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1733"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1735"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1785"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1796"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1851"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1898"}],"affected":[{"package":{"name":"vim","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/vim@2:7.4.1689-3ubuntu1.5+esm8?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:7.4.1689-3ubuntu1.5+esm8"}]}],"versions":["2:7.4.712-2ubuntu4","2:7.4.826-1ubuntu1","2:7.4.826-1ubuntu2","2:7.4.826-1ubuntu3","2:7.4.963-1ubuntu1","2:7.4.963-1ubuntu4","2:7.4.963-1ubuntu5","2:7.4.1689-3ubuntu1","2:7.4.1689-3ubuntu1.1","2:7.4.1689-3ubuntu1.2","2:7.4.1689-3ubuntu1.3","2:7.4.1689-3ubuntu1.4","2:7.4.1689-3ubuntu1.5","2:7.4.1689-3ubuntu1.5+esm2","2:7.4.1689-3ubuntu1.5+esm3","2:7.4.1689-3ubuntu1.5+esm4","2:7.4.1689-3ubuntu1.5+esm5","2:7.4.1689-3ubuntu1.5+esm6","2:7.4.1689-3ubuntu1.5+esm7"],"ecosystem_specific":{"binaries":[{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-athena"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-athena-py2"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-common"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-gnome"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-gnome-py2"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-gtk"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-gtk-py2"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-gtk3"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-gtk3-py2"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-gui-common"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-nox"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-nox-py2"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-runtime"},{"binary_version":"2:7.4.1689-3ubuntu1.5+esm8","binary_name":"vim-tiny"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5498-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2022-0413","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1629","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1733","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-1735","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-1785","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-1796","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-1851","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1898","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}