
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-3016 is a Use-After-Free vulnerability discovered in the Vim text editor affecting versions prior to 9.0.0286. The vulnerability was identified in the GitHub repository vim/vim and was disclosed in August 2022. The issue specifically affects the location list functionality in Vim (CVE Mitre, NVD).
The vulnerability occurs in the quickfix.c file where memory is incorrectly handled when the location list is changed in an autocmd. The issue specifically manifests in the get_next_valid_entry() function. The fix involved returning QF_ABORT and handling it appropriately to prevent the use-after-free condition (Vim Commit).
If an attacker could trick a user into opening a specially crafted file, it could cause Vim to crash or potentially execute arbitrary code. The vulnerability particularly affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS systems (Broadcom Support).
The vulnerability was fixed in Vim version 9.0.0286. Users are advised to upgrade to this version or later. Various Linux distributions have released patches for their respective packages, including Ubuntu (2:8.2.3995-1ubuntu2.11), Fedora (vim-9.0.412-1.fc37), and Gentoo (>=9.0.1157) (Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."