First published: Wed Oct 26 2022(Updated: )
A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.
Credit: CVE-2022-3705 cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <9.0.0805 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =10.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Apple macOS Ventura | <13.2 | 13.2 |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0861-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-3705 is a vulnerability in Vim that allows for a use after free issue to occur due to improper memory management.
CVE-2022-3705 affects macOS Ventura version up to, but not including, 13.2.
To fix CVE-2022-3705, update your macOS Ventura to version 13.2 or higher.
The severity of CVE-2022-3705 is not specified.
More information about CVE-2022-3705 can be found at the following link: [Apple Support](https://support.apple.com/en-us/HT213605).