CVE-2022-0696
Publication date 21 February 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.
Status
Package | Ubuntu Release | Status |
---|---|---|
vim | ||
22.04 LTS jammy |
Fixed 2:8.2.3995-1ubuntu2.9
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
ccdm94
the line presented as the one containing the instruction that triggers the error in the bug report stack trace was introduced by commit a1198124370a (>= 8.2.3629). Eventhough the code for focal and impish is very similar to the vulnerable one, the reproducer does not work for impish and earlier, further indicating that the previously mentioned commit might have been the one to introduce the issue.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 · Medium |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6195-1
- Vim vulnerabilities
- 3 July 2023
Other references
- https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f/
- https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1 (v8.2.4428)
- https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1
- https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f
- https://www.cve.org/CVERecord?id=CVE-2022-0696