Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3011-1 | vim security update |
Debian DLA |
DLA-3182-1 | vim security update |
Debian DLA |
DLA-4097-1 | vim security update |
EUVD |
EUVD-2022-24905 | Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution |
Ubuntu USN |
USN-5460-1 | Vim vulnerabilities |
Ubuntu USN |
USN-5613-1 | Vim vulnerabilities |
Ubuntu USN |
USN-5613-2 | Vim regression |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: @huntrdev
Published:
Updated: 2025-11-03T20:34:35.839Z
Reserved: 2022-05-06T00:00:00.000Z
Link: CVE-2022-1616
No data.
Status : Modified
Published: 2022-05-07T19:15:07.447
Modified: 2024-11-21T06:41:05.867
Link: CVE-2022-1616
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN