CVE-2022-1942
NixOS vulnerability analysis and mitigation

Overview

A heap-based buffer overflow vulnerability was discovered in GitHub repository vim/vim prior to version 8.2. The vulnerability was assigned CVE-2022-1942 and was disclosed in May 2022. This security flaw affects various versions of Vim text editor across multiple operating systems and distributions (NVD, Debian Tracker).

Technical details

The vulnerability is a heap-based buffer overflow that occurs in the vimregsubboth() function. The issue has been assigned a CVSS v3.1 base score of 7.8 (High), with attack vector being Local, attack complexity Low, requiring no privileges but user interaction, and having High impact on confidentiality, integrity, and availability (Ubuntu).

Impact

If successfully exploited, this vulnerability could allow an attacker to cause unexpected application termination or potentially execute arbitrary code. The vulnerability affects multiple operating systems including Ubuntu, Debian, Fedora, and macOS, potentially exposing users to security risks when processing maliciously crafted files (Debian LTS).

Mitigation and workarounds

The vulnerability has been fixed in Vim version 8.2.5043 through a patch that addresses the heap-based buffer overflow. Users are advised to upgrade to the patched version. Various distributions have released security updates: Ubuntu has fixed versions available for multiple releases, Debian has released version 2:8.1.0875-5+deb10u4, and Fedora has updated to version 8.2.5052-1.fc35 (Vim Commit, Gentoo).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management