
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability was discovered in GitHub repository vim/vim prior to version 8.2. The vulnerability was assigned CVE-2022-1942 and was disclosed in May 2022. This security flaw affects various versions of Vim text editor across multiple operating systems and distributions (NVD, Debian Tracker).
The vulnerability is a heap-based buffer overflow that occurs in the vimregsubboth() function. The issue has been assigned a CVSS v3.1 base score of 7.8 (High), with attack vector being Local, attack complexity Low, requiring no privileges but user interaction, and having High impact on confidentiality, integrity, and availability (Ubuntu).
If successfully exploited, this vulnerability could allow an attacker to cause unexpected application termination or potentially execute arbitrary code. The vulnerability affects multiple operating systems including Ubuntu, Debian, Fedora, and macOS, potentially exposing users to security risks when processing maliciously crafted files (Debian LTS).
The vulnerability has been fixed in Vim version 8.2.5043 through a patch that addresses the heap-based buffer overflow. Users are advised to upgrade to the patched version. Various distributions have released security updates: Ubuntu has fixed versions available for multiple releases, Debian has released version 2:8.1.0875-5+deb10u4, and Fedora has updated to version 8.2.5052-1.fc35 (Vim Commit, Gentoo).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."