{"id":"USN-5775-1","summary":"vim vulnerabilities","details":"It was discovered that Vim uses freed memory in recurisve substitution of\nspecially crafted patterns. An attacker could possbly use this to crash Vim\nand cause denial of service. (CVE-2022-2345)\n\nIt was discovered that Vim makes illegal memory calls when patterns start\nwith an illegal byte. An attacker could possibly use this to crash Vim,\naccess or modify memory, or execute arbitrary commands. (CVE-2022-2581)\n\nIt was discovered that Vim could be made to crash when parsing invalid line\nnumbers. An attacker could possbly use this to crash Vim and cause denial\nof service. (CVE-2022-3099)\n\nIt was discovered that Vim uses freed memory when autocmd changes a mark.\nAn attacker could possbly use this to crash Vim and cause denial of\nservice. (CVE-2022-3256)\n\nIt was discovered the Vim uses an incorrect array index when window width\nis negative. A local attacker could possbly use this to crash Vim and cause\ndenial of service. (CVE-2022-3324)\n\nIt was discoverd that certain buffers could be sent to the wrong window. An\nattacker with local access could use this to send messages to the wrong\nwindow. (CVE-2022-3591)\n","modified":"2026-02-10T04:42:52Z","published":"2022-12-12T22:32:53Z","related":["UBUNTU-CVE-2022-2345","UBUNTU-CVE-2022-2581","UBUNTU-CVE-2022-3099","UBUNTU-CVE-2022-3256","UBUNTU-CVE-2022-3324","UBUNTU-CVE-2022-3591"],"upstream":["CVE-2022-2345","CVE-2022-2581","CVE-2022-3099","CVE-2022-3256","CVE-2022-3324","CVE-2022-3591","UBUNTU-CVE-2022-2345","UBUNTU-CVE-2022-2581","UBUNTU-CVE-2022-3099","UBUNTU-CVE-2022-3256","UBUNTU-CVE-2022-3324","UBUNTU-CVE-2022-3591"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5775-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2345"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2581"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3099"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3256"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3324"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3591"}],"affected":[{"package":{"name":"vim","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/vim@2:7.4.1689-3ubuntu1.5+esm14?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:7.4.1689-3ubuntu1.5+esm14"}]}],"versions":["2:7.4.712-2ubuntu4","2:7.4.826-1ubuntu1","2:7.4.826-1ubuntu2","2:7.4.826-1ubuntu3","2:7.4.963-1ubuntu1","2:7.4.963-1ubuntu4","2:7.4.963-1ubuntu5","2:7.4.1689-3ubuntu1","2:7.4.1689-3ubuntu1.1","2:7.4.1689-3ubuntu1.2","2:7.4.1689-3ubuntu1.3","2:7.4.1689-3ubuntu1.4","2:7.4.1689-3ubuntu1.5","2:7.4.1689-3ubuntu1.5+esm2","2:7.4.1689-3ubuntu1.5+esm3","2:7.4.1689-3ubuntu1.5+esm4","2:7.4.1689-3ubuntu1.5+esm5","2:7.4.1689-3ubuntu1.5+esm6","2:7.4.1689-3ubuntu1.5+esm7","2:7.4.1689-3ubuntu1.5+esm8","2:7.4.1689-3ubuntu1.5+esm10","2:7.4.1689-3ubuntu1.5+esm11","2:7.4.1689-3ubuntu1.5+esm12","2:7.4.1689-3ubuntu1.5+esm13"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"vim","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-athena","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-athena-py2","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-common","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-gnome","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-gnome-py2","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-gtk","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-gtk-py2","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-gtk3","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-gtk3-py2","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-gui-common","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-nox","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-nox-py2","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-runtime","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"},{"binary_name":"vim-tiny","binary_version":"2:7.4.1689-3ubuntu1.5+esm14"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2345"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-2581"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3099"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3256"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3324"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-3591"}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5775-1.json"}}],"schema_version":"1.7.3"}