First published: Wed Mar 30 2022(Updated: )
Last updated 24 July 2024
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <8.2.4646 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0861-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1154 is a vulnerability in the utf_ptr2char function in the GitHub repository vim/vim. It is a use after free vulnerability that exists in versions prior to 8.2.4646.
CVE-2022-1154 affects Vim versions prior to 8.2.4646. It allows an attacker to cause a use after free condition in the utf_ptr2char function, potentially leading to arbitrary code execution.
CVE-2022-1154 has a severity rating of high.
To fix CVE-2022-1154, update Vim to version 8.2.4646 or later.
You can find more information about CVE-2022-1154 in the references provided: https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425, https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5, https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/