Related Vulnerabilities: CVE-2022-2345  

Use After Free in GitHub repository vim/vim prior to 9.0.0046.

Description

The MITRE CVE dictionary describes this issue as:

Use After Free in GitHub repository vim/vim prior to 9.0.0046.

Statement

Red Hat Product Security has rated this issue as having a Low security impact because the user has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.

Red Hat Product Security has rated this issue as having a Low security impact because the user has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.

For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.

Mitigation

Do not run untrusted vim scripts as it's not recommended.

Additional Information

  • Bugzilla 2106775: CVE-2022-2345 vim: use-after-free in skipwhite() in charset.c
  • CWE-416: Use After Free
  • FAQ: Frequently asked questions about CVE-2022-2345