First published: Tue Sep 27 2022(Updated: )
Last updated 24 July 2024
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0967-2 |
Vim | <9.0.0598 | |
Fedora | =35 | |
Fedora | =36 | |
Fedora | =37 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3324 is a stack-based buffer overflow vulnerability in the GitHub repository vim/vim prior to version 9.0.0598.
CVE-2022-3324 affects Ubuntu versions 2:7.4.1689-3ubuntu1.5+ and 9.0.0598 and later.
CVE-2022-3324 affects Debian versions 2:8.1.0875-5+deb10u2 and 2:8.2.2434-3+deb11u1, as well as versions 2:9.0.1378-2 and 2:9.0.1894-1.
Yes, the fix for CVE-2022-3324 is included in version 9.0.0598 of the vim/vim repository.
The Common Weakness Enumeration (CWE) ID for CVE-2022-3324 is CWE-119.