ID

VAR-202206-1426


CVE

CVE-2022-2126


TITLE

vim/vim  Out-of-bounds read vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-011657

DESCRIPTION

Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. vim/vim Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Vim is a cross-platform text editor. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202208-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Vim, gVim: Multiple Vulnerabilities Date: August 21, 2022 Bugs: #811870, #818562, #819528, #823473, #824930, #828583, #829658, #830106, #830994, #833572, #836432, #851231 ID: 202208-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. Background ========= Vim is an efficient, highly configurable improved version of the classic ‘vi’ text editor. gVim is the GUI version of Vim. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-editors/gvim < 9.0.0060 >= 9.0.0060 2 app-editors/vim < 9.0.0060 >= 9.0.0060 3 app-editors/vim-core < 9.0.0060 >= 9.0.0060 Description ========== Multiple vulnerabilities have been discovered in Vim and gVim. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Vim users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/vim-9.0.0060" All gVim users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/gvim-9.0.0060" All vim-core users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.0.0060" References ========= [ 1 ] CVE-2021-3770 https://nvd.nist.gov/vuln/detail/CVE-2021-3770 [ 2 ] CVE-2021-3778 https://nvd.nist.gov/vuln/detail/CVE-2021-3778 [ 3 ] CVE-2021-3796 https://nvd.nist.gov/vuln/detail/CVE-2021-3796 [ 4 ] CVE-2021-3872 https://nvd.nist.gov/vuln/detail/CVE-2021-3872 [ 5 ] CVE-2021-3875 https://nvd.nist.gov/vuln/detail/CVE-2021-3875 [ 6 ] CVE-2021-3927 https://nvd.nist.gov/vuln/detail/CVE-2021-3927 [ 7 ] CVE-2021-3928 https://nvd.nist.gov/vuln/detail/CVE-2021-3928 [ 8 ] CVE-2021-3968 https://nvd.nist.gov/vuln/detail/CVE-2021-3968 [ 9 ] CVE-2021-3973 https://nvd.nist.gov/vuln/detail/CVE-2021-3973 [ 10 ] CVE-2021-3974 https://nvd.nist.gov/vuln/detail/CVE-2021-3974 [ 11 ] CVE-2021-3984 https://nvd.nist.gov/vuln/detail/CVE-2021-3984 [ 12 ] CVE-2021-4019 https://nvd.nist.gov/vuln/detail/CVE-2021-4019 [ 13 ] CVE-2021-4069 https://nvd.nist.gov/vuln/detail/CVE-2021-4069 [ 14 ] CVE-2021-4136 https://nvd.nist.gov/vuln/detail/CVE-2021-4136 [ 15 ] CVE-2021-4166 https://nvd.nist.gov/vuln/detail/CVE-2021-4166 [ 16 ] CVE-2021-4173 https://nvd.nist.gov/vuln/detail/CVE-2021-4173 [ 17 ] CVE-2021-4187 https://nvd.nist.gov/vuln/detail/CVE-2021-4187 [ 18 ] CVE-2021-4192 https://nvd.nist.gov/vuln/detail/CVE-2021-4192 [ 19 ] CVE-2021-4193 https://nvd.nist.gov/vuln/detail/CVE-2021-4193 [ 20 ] CVE-2021-46059 https://nvd.nist.gov/vuln/detail/CVE-2021-46059 [ 21 ] CVE-2022-0128 https://nvd.nist.gov/vuln/detail/CVE-2022-0128 [ 22 ] CVE-2022-0156 https://nvd.nist.gov/vuln/detail/CVE-2022-0156 [ 23 ] CVE-2022-0158 https://nvd.nist.gov/vuln/detail/CVE-2022-0158 [ 24 ] CVE-2022-0213 https://nvd.nist.gov/vuln/detail/CVE-2022-0213 [ 25 ] CVE-2022-0261 https://nvd.nist.gov/vuln/detail/CVE-2022-0261 [ 26 ] CVE-2022-0318 https://nvd.nist.gov/vuln/detail/CVE-2022-0318 [ 27 ] CVE-2022-0319 https://nvd.nist.gov/vuln/detail/CVE-2022-0319 [ 28 ] CVE-2022-0351 https://nvd.nist.gov/vuln/detail/CVE-2022-0351 [ 29 ] CVE-2022-0359 https://nvd.nist.gov/vuln/detail/CVE-2022-0359 [ 30 ] CVE-2022-0361 https://nvd.nist.gov/vuln/detail/CVE-2022-0361 [ 31 ] CVE-2022-0368 https://nvd.nist.gov/vuln/detail/CVE-2022-0368 [ 32 ] CVE-2022-0392 https://nvd.nist.gov/vuln/detail/CVE-2022-0392 [ 33 ] CVE-2022-0393 https://nvd.nist.gov/vuln/detail/CVE-2022-0393 [ 34 ] CVE-2022-0407 https://nvd.nist.gov/vuln/detail/CVE-2022-0407 [ 35 ] CVE-2022-0408 https://nvd.nist.gov/vuln/detail/CVE-2022-0408 [ 36 ] CVE-2022-0413 https://nvd.nist.gov/vuln/detail/CVE-2022-0413 [ 37 ] CVE-2022-0417 https://nvd.nist.gov/vuln/detail/CVE-2022-0417 [ 38 ] CVE-2022-0443 https://nvd.nist.gov/vuln/detail/CVE-2022-0443 [ 39 ] CVE-2022-0554 https://nvd.nist.gov/vuln/detail/CVE-2022-0554 [ 40 ] CVE-2022-0629 https://nvd.nist.gov/vuln/detail/CVE-2022-0629 [ 41 ] CVE-2022-0685 https://nvd.nist.gov/vuln/detail/CVE-2022-0685 [ 42 ] CVE-2022-0714 https://nvd.nist.gov/vuln/detail/CVE-2022-0714 [ 43 ] CVE-2022-0729 https://nvd.nist.gov/vuln/detail/CVE-2022-0729 [ 44 ] CVE-2022-0943 https://nvd.nist.gov/vuln/detail/CVE-2022-0943 [ 45 ] CVE-2022-1154 https://nvd.nist.gov/vuln/detail/CVE-2022-1154 [ 46 ] CVE-2022-1160 https://nvd.nist.gov/vuln/detail/CVE-2022-1160 [ 47 ] CVE-2022-1381 https://nvd.nist.gov/vuln/detail/CVE-2022-1381 [ 48 ] CVE-2022-1420 https://nvd.nist.gov/vuln/detail/CVE-2022-1420 [ 49 ] CVE-2022-1616 https://nvd.nist.gov/vuln/detail/CVE-2022-1616 [ 50 ] CVE-2022-1619 https://nvd.nist.gov/vuln/detail/CVE-2022-1619 [ 51 ] CVE-2022-1620 https://nvd.nist.gov/vuln/detail/CVE-2022-1620 [ 52 ] CVE-2022-1621 https://nvd.nist.gov/vuln/detail/CVE-2022-1621 [ 53 ] CVE-2022-1629 https://nvd.nist.gov/vuln/detail/CVE-2022-1629 [ 54 ] CVE-2022-1674 https://nvd.nist.gov/vuln/detail/CVE-2022-1674 [ 55 ] CVE-2022-1720 https://nvd.nist.gov/vuln/detail/CVE-2022-1720 [ 56 ] CVE-2022-1733 https://nvd.nist.gov/vuln/detail/CVE-2022-1733 [ 57 ] CVE-2022-1735 https://nvd.nist.gov/vuln/detail/CVE-2022-1735 [ 58 ] CVE-2022-1769 https://nvd.nist.gov/vuln/detail/CVE-2022-1769 [ 59 ] CVE-2022-1771 https://nvd.nist.gov/vuln/detail/CVE-2022-1771 [ 60 ] CVE-2022-1785 https://nvd.nist.gov/vuln/detail/CVE-2022-1785 [ 61 ] CVE-2022-1796 https://nvd.nist.gov/vuln/detail/CVE-2022-1796 [ 62 ] CVE-2022-1851 https://nvd.nist.gov/vuln/detail/CVE-2022-1851 [ 63 ] CVE-2022-1886 https://nvd.nist.gov/vuln/detail/CVE-2022-1886 [ 64 ] CVE-2022-1897 https://nvd.nist.gov/vuln/detail/CVE-2022-1897 [ 65 ] CVE-2022-1898 https://nvd.nist.gov/vuln/detail/CVE-2022-1898 [ 66 ] CVE-2022-1927 https://nvd.nist.gov/vuln/detail/CVE-2022-1927 [ 67 ] CVE-2022-1942 https://nvd.nist.gov/vuln/detail/CVE-2022-1942 [ 68 ] CVE-2022-1968 https://nvd.nist.gov/vuln/detail/CVE-2022-1968 [ 69 ] CVE-2022-2000 https://nvd.nist.gov/vuln/detail/CVE-2022-2000 [ 70 ] CVE-2022-2042 https://nvd.nist.gov/vuln/detail/CVE-2022-2042 [ 71 ] CVE-2022-2124 https://nvd.nist.gov/vuln/detail/CVE-2022-2124 [ 72 ] CVE-2022-2125 https://nvd.nist.gov/vuln/detail/CVE-2022-2125 [ 73 ] CVE-2022-2126 https://nvd.nist.gov/vuln/detail/CVE-2022-2126 [ 74 ] CVE-2022-2129 https://nvd.nist.gov/vuln/detail/CVE-2022-2129 [ 75 ] CVE-2022-2175 https://nvd.nist.gov/vuln/detail/CVE-2022-2175 [ 76 ] CVE-2022-2182 https://nvd.nist.gov/vuln/detail/CVE-2022-2182 [ 77 ] CVE-2022-2183 https://nvd.nist.gov/vuln/detail/CVE-2022-2183 [ 78 ] CVE-2022-2206 https://nvd.nist.gov/vuln/detail/CVE-2022-2206 [ 79 ] CVE-2022-2207 https://nvd.nist.gov/vuln/detail/CVE-2022-2207 [ 80 ] CVE-2022-2208 https://nvd.nist.gov/vuln/detail/CVE-2022-2208 [ 81 ] CVE-2022-2210 https://nvd.nist.gov/vuln/detail/CVE-2022-2210 [ 82 ] CVE-2022-2231 https://nvd.nist.gov/vuln/detail/CVE-2022-2231 [ 83 ] CVE-2022-2257 https://nvd.nist.gov/vuln/detail/CVE-2022-2257 [ 84 ] CVE-2022-2264 https://nvd.nist.gov/vuln/detail/CVE-2022-2264 [ 85 ] CVE-2022-2284 https://nvd.nist.gov/vuln/detail/CVE-2022-2284 [ 86 ] CVE-2022-2285 https://nvd.nist.gov/vuln/detail/CVE-2022-2285 [ 87 ] CVE-2022-2286 https://nvd.nist.gov/vuln/detail/CVE-2022-2286 [ 88 ] CVE-2022-2287 https://nvd.nist.gov/vuln/detail/CVE-2022-2287 [ 89 ] CVE-2022-2288 https://nvd.nist.gov/vuln/detail/CVE-2022-2288 [ 90 ] CVE-2022-2289 https://nvd.nist.gov/vuln/detail/CVE-2022-2289 [ 91 ] CVE-2022-2304 https://nvd.nist.gov/vuln/detail/CVE-2022-2304 [ 92 ] CVE-2022-2343 https://nvd.nist.gov/vuln/detail/CVE-2022-2343 [ 93 ] CVE-2022-2344 https://nvd.nist.gov/vuln/detail/CVE-2022-2344 [ 94 ] CVE-2022-2345 https://nvd.nist.gov/vuln/detail/CVE-2022-2345 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202208-32 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7 macOS Big Sur 11.7 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213443. AppleMobileFileIntegrity Available for: macOS Big Sur Impact: An app may be able to access user-sensitive data Description: An issue in code signature validation was addressed with improved checks. CVE-2022-42789: Koh M. Nakagawa of FFRI Security, Inc. Entry added October 27, 2022 ATS Available for: macOS Big Sur Impact: An app may be able to access user-sensitive data Description: An access issue was addressed with additional sandbox restrictions. CVE-2022-32904: Mickey Jin (@patch1t) Entry added October 27, 2022 ATS Available for: macOS Big Sur Impact: An app may be able to bypass Privacy preferences Description: A logic issue was addressed with improved state management. CVE-2022-32902: Mickey Jin (@patch1t) Calendar Available for: macOS Big Sur Impact: An app may be able to read sensitive location information Description: An access issue was addressed with improved access restrictions. CVE-2022-42819: an anonymous researcher Entry added October 27, 2022 Contacts Available for: macOS Big Sur Impact: An app may be able to bypass Privacy preferences Description: This issue was addressed with improved checks. CVE-2022-32854: Holger Fuhrmannek of Deutsche Telekom Security GarageBand Available for: macOS Big Sur Impact: An app may be able to access user-sensitive data Description: A configuration issue was addressed with additional restrictions. CVE-2022-32877: Wojciech Reguła (@_r3ggi) of SecuRing Entry added October 27, 2022 ImageIO Available for: macOS Big Sur Impact: Processing an image may lead to a denial-of-service Description: A denial-of-service issue was addressed with improved validation. CVE-2022-1622 Entry added October 27, 2022 Image Processing Available for: macOS Big Sur Impact: A sandboxed app may be able to determine which app is currently using the camera Description: The issue was addressed with additional restrictions on the observability of app states. CVE-2022-32913: Yiğit Can YILMAZ (@yilmazcanyigit) Entry added October 27, 2022 iMovie Available for: macOS Big Sur Impact: A user may be able to view sensitive user information Description: This issue was addressed by enabling hardened runtime. CVE-2022-32896: Wojciech Reguła (@_r3ggi) Kernel Available for: macOS Big Sur Impact: An app may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-32914: Zweig of Kunlun Lab Entry added October 27, 2022 Kernel Available for: macOS Big Sur Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32866: Linus Henze of Pinauten GmbH (pinauten.de) CVE-2022-32911: Zweig of Kunlun Lab CVE-2022-32924: Ian Beer of Google Project Zero Entry updated October 27, 2022 Kernel Available for: macOS Big Sur Impact: An app may be able to disclose kernel memory Description: The issue was addressed with improved memory handling. CVE-2022-32864: Linus Henze of Pinauten GmbH (pinauten.de) Kernel Available for: macOS Big Sur Impact: An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-32894: an anonymous researcher Kernel Available for: macOS Big Sur Impact: An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. Description: The issue was addressed with improved bounds checks. CVE-2022-32917: an anonymous researcher Maps Available for: macOS Big Sur Impact: An app may be able to read sensitive location information Description: A logic issue was addressed with improved restrictions. CVE-2022-32883: Ron Masas of breakpointhq.com Entry updated October 27, 2022 MediaLibrary Available for: macOS Big Sur Impact: A user may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2022-32908: an anonymous researcher ncurses Available for: macOS Big Sur Impact: A user may be able to cause unexpected app termination or arbitrary code execution Description: A buffer overflow was addressed with improved bounds checking. CVE-2021-39537 Entry added October 27, 2022 PackageKit Available for: macOS Big Sur Impact: An app may be able to gain elevated privileges Description: A logic issue was addressed with improved state management. CVE-2022-32900: Mickey Jin (@patch1t) Sandbox Available for: macOS Big Sur Impact: An app may be able to modify protected parts of the file system Description: A logic issue was addressed with improved restrictions. CVE-2022-32881: Csaba Fitzl (@theevilbit) of Offensive Security Entry added October 27, 2022 Security Available for: macOS Big Sur Impact: An app may be able to bypass code signing checks Description: An issue in code signature validation was addressed with improved checks. CVE-2022-42793: Linus Henze of Pinauten GmbH (pinauten.de) Entry added October 27, 2022 Sidecar Available for: macOS Big Sur Impact: A user may be able to view restricted content from the lock screen Description: A logic issue was addressed with improved state management. CVE-2022-42790: Om kothawade of Zaprico Digital Entry added October 27, 2022 SMB Available for: macOS Big Sur Impact: A remote user may be able to cause kernel code execution Description: The issue was addressed with improved memory handling. CVE-2022-32934: Felix Poulin-Belanger Entry added October 27, 2022 Vim Available for: macOS Big Sur Impact: Processing a maliciously crafted file may lead to a denial- of-service or potentially disclose memory contents Description: This issue was addressed with improved checks. CVE-2022-1720 CVE-2022-2000 CVE-2022-2042 CVE-2022-2124 CVE-2022-2125 CVE-2022-2126 Entry added October 27, 2022 Weather Available for: macOS Big Sur Impact: An app may be able to read sensitive location information Description: A logic issue was addressed with improved state management. CVE-2022-32875: an anonymous researcher Entry added October 27, 2022 WebKit Available for: macOS Big Sur Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. WebKit Bugzilla: 242047 CVE-2022-32888: P1umer (@p1umer) Entry added October 27, 2022 Additional recognition Identity Services We would like to acknowledge Joshua Jones for their assistance. macOS Big Sur 11.7 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmNbKpYACgkQ4RjMIDke NxnDzw/7BbMWXxZ6uPMWb3LMFZlymEZMCtL5S27GA8HXiz7SU6c2wPrF1ofp8Bbz pYGy4OrK17rAb/qHIig03TVE6EJl4ScZHv7STn1gQ5ciKqud6jL16mm2BjRCm2T4 ZQtTzrQrSRHJbBSUSsnZxi5Wp9wjIA6w8JVvMqdBrnpu3yWt8Jo0tW0d/nO1EK3I QlfDgOaiZrdHN2m/Y+kjWOhRqDLe2QWObQh95Gyybi3++ctTr58PBLBYLhWgLMoV AMj69PLudFI8cEeqhDlfVK7ept2O+WLkYeI/Px5nG7YHhndr9fiR55Rz5m2Hl44k rnxDKs9hVQLwSHAo9uJ1DBUteEzgdUJWiwGxP4InnCmhlXpJl7AkVsr7bq5iaDcT o32wNfv1BEzBBvINNfw1PZ+JwNmEwugSj1UX54GFOj3B9WjGguIi0dMqOc0j6GKm xnIwzPIlHhHb/1D17kl/kTQH602w/Mf5OIlSfL/mk0CKjwR+0QvQF5HXhULJHbqJ Kpx8C1JfhnyWqBoCuh+URCKlZJ4T3P6IUgoRzuX4Jk3TDABCP5jgEZOzj76JPE1y IVt8ULLARjjUdEOzC8dZkaeGUOAerzfxIU8QJwmrnHQI3vQX7JR9MbK1S+PRJsGy 1h69HcdL2HGpjPyDf9uI2nMOntOUrTz/PqjQUzmfllq3B42RPZs= =euaC -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-5723-1 November 14, 2022 vim vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: Several security issues were fixed in Vim. Software Description: - vim: Vi IMproved - enhanced vi editor Details: It was discovered that Vim could be made to crash when searching specially crafted patterns. An attacker could possibly use this to crash Vim and cause denial of service. (CVE-2022-1674) It was discovered that there existed a NULL pointer dereference in Vim. An attacker could possibly use this to crash Vim and cause denial of service. (CVE-2022-1725) It was discovered that there existed a buffer over-read in Vim when searching specially crafted patterns. An attacker could possibly use this to crash Vim and cause denial of service. (CVE-2022-2124) It was discovered that there existed a heap buffer overflow in Vim when auto-indenting lisp. An attacker could possibly use this to crash Vim and cause denial of service. (CVE-2022-2125) It was discovered that there existed an out of bounds read in Vim when performing spelling suggestions. An attacker could possibly use this to crash Vim and cause denial of service. (CVE-2022-2126) It was discovered that Vim accessed invalid memory when executing specially crafted command line expressions. An attacker could possibly use this to crash Vim, access or modify memory, or execute arbitrary commands. (CVE-2022-2175) It was discovered that there existed an out-of-bounds read in Vim when auto-indenting lisp. An attacker could possibly use this to crash Vim, access or modify memory, or execute arbitrary commands. (CVE-2022-2183) It was discovered that Vim accessed invalid memory when terminal size changed. An attacker could possibly use this to crash Vim, access or modify memory, or execute arbitrary commands. (CVE-2022-2206) It was discovered that there existed a stack buffer overflow in Vim's spelldump. An attacker could possibly use this to crash Vim and cause denial of service. (CVE-2022-2304) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: vim 2:7.4.1689-3ubuntu1.5+esm13 vim-athena 2:7.4.1689-3ubuntu1.5+esm13 vim-athena-py2 2:7.4.1689-3ubuntu1.5+esm13 vim-gnome 2:7.4.1689-3ubuntu1.5+esm13 vim-gnome-py2 2:7.4.1689-3ubuntu1.5+esm13 vim-gtk 2:7.4.1689-3ubuntu1.5+esm13 vim-gtk-py2 2:7.4.1689-3ubuntu1.5+esm13 vim-gtk3 2:7.4.1689-3ubuntu1.5+esm13 vim-gtk3-py2 2:7.4.1689-3ubuntu1.5+esm13 vim-nox 2:7.4.1689-3ubuntu1.5+esm13 vim-nox-py2 2:7.4.1689-3ubuntu1.5+esm13 vim-tiny 2:7.4.1689-3ubuntu1.5+esm13 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5723-1 CVE-2022-1674, CVE-2022-1725, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2175, CVE-2022-2183, CVE-2022-2206, CVE-2022-2304

Trust: 2.25

sources: NVD: CVE-2022-2126 // JVNDB: JVNDB-2022-011657 // VULHUB: VHN-426195 // VULMON: CVE-2022-2126 // PACKETSTORM: 168124 // PACKETSTORM: 171681 // PACKETSTORM: 172122 // PACKETSTORM: 169585 // PACKETSTORM: 169832

AFFECTED PRODUCTS

vendor:applemodel:macosscope:gteversion:12.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.6

Trust: 1.0

vendor:vimmodel:vimscope:ltversion:8.2.5123

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.7

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:vimmodel:vimscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:アップルmodel:macosscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-011657 // NVD: CVE-2022-2126

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-2126
value: HIGH

Trust: 1.0

security@huntr.dev: CVE-2022-2126
value: HIGH

Trust: 1.0

NVD: CVE-2022-2126
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202206-1994
value: HIGH

Trust: 0.6

VULHUB: VHN-426195
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-2126
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-2126
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-426195
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

security@huntr.dev: CVE-2022-2126
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2022-2126
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-426195 // VULMON: CVE-2022-2126 // JVNDB: JVNDB-2022-011657 // CNNVD: CNNVD-202206-1994 // NVD: CVE-2022-2126 // NVD: CVE-2022-2126

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

problemtype:Out-of-bounds read (CWE-125) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-426195 // JVNDB: JVNDB-2022-011657 // NVD: CVE-2022-2126

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202206-1994

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202206-1994

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-426195

PATCH

title:HT213488url:https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html

Trust: 0.8

title:Vim Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=197751

Trust: 0.6

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2022-2126

Trust: 0.1

title:Ubuntu Security Notice: USN-5723-1: Vim vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5723-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: vim: CVE-2022-1942 CVE-2022-1968 CVE-2022-2000 CVE-2022-2124 CVE-2022-2125 CVE-2022-2126 CVE-2022-2129 CVE-2022-2285 CVE-2022-2288 CVE-2022-2304 CVE-2022-2207 CVE-2022-1616 CVE-2022-1619 CVE-2022-1621 CVE-2022-1720 CVE-2022-1785 CVE-2022-1851 CVE-2022-1897 CVE-2022-1898url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=11dbcf77118f7ec64d0ef6c1e3c087e3

Trust: 0.1

title:Amazon Linux AMI: ALAS-2022-1628url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1628

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1829url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1829

Trust: 0.1

title:Amazon Linux 2022: ALAS2022-2022-116url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-116

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

sources: VULMON: CVE-2022-2126 // JVNDB: JVNDB-2022-011657 // CNNVD: CNNVD-202206-1994

EXTERNAL IDS

db:NVDid:CVE-2022-2126

Trust: 3.9

db:PACKETSTORMid:169585

Trust: 0.8

db:PACKETSTORMid:169832

Trust: 0.8

db:JVNDBid:JVNDB-2022-011657

Trust: 0.8

db:CNNVDid:CNNVD-202206-1994

Trust: 0.7

db:AUSCERTid:ESB-2023.0019

Trust: 0.6

db:AUSCERTid:ESB-2022.5300

Trust: 0.6

db:AUSCERTid:ESB-2022.3012

Trust: 0.6

db:AUSCERTid:ESB-2022.5872

Trust: 0.6

db:VULHUBid:VHN-426195

Trust: 0.1

db:VULMONid:CVE-2022-2126

Trust: 0.1

db:PACKETSTORMid:168124

Trust: 0.1

db:PACKETSTORMid:171681

Trust: 0.1

db:PACKETSTORMid:172122

Trust: 0.1

sources: VULHUB: VHN-426195 // VULMON: CVE-2022-2126 // JVNDB: JVNDB-2022-011657 // PACKETSTORM: 168124 // PACKETSTORM: 171681 // PACKETSTORM: 172122 // PACKETSTORM: 169585 // PACKETSTORM: 169832 // CNNVD: CNNVD-202206-1994 // NVD: CVE-2022-2126

REFERENCES

url:https://security.gentoo.org/glsa/202208-32

Trust: 1.9

url:https://support.apple.com/kb/ht213443

Trust: 1.8

url:https://support.apple.com/kb/ht213444

Trust: 1.8

url:https://support.apple.com/kb/ht213488

Trust: 1.8

url:https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e

Trust: 1.8

url:http://seclists.org/fulldisclosure/2022/oct/28

Trust: 1.8

url:http://seclists.org/fulldisclosure/2022/oct/41

Trust: 1.8

url:http://seclists.org/fulldisclosure/2022/oct/43

Trust: 1.8

url:http://seclists.org/fulldisclosure/2022/oct/45

Trust: 1.8

url:https://github.com/vim/vim/commit/156d3911952d73b03d7420dc3540215247db0fe8

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html

Trust: 1.8

url:https://security.gentoo.org/glsa/202305-16

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-2126

Trust: 1.3

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/u743fmjgfq35gbpcq6owmvzejpdfvewm/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/gfd2a4ylbr7oirhtl7ck6ynmeiq264cn/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/gfd2a4ylbr7oirhtl7ck6ynmeiq264cn/

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/u743fmjgfq35gbpcq6owmvzejpdfvewm/

Trust: 0.8

url:https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e/

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2022-2126

Trust: 0.7

url:https://packetstormsecurity.com/files/169585/apple-security-advisory-2022-10-27-9.html

Trust: 0.6

url:https://packetstormsecurity.com/files/169832/ubuntu-security-notice-usn-5723-1.html

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-2126/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0019

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5300

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5872

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3012

Trust: 0.6

url:https://vigilance.fr/vulnerability/vim-out-of-bounds-memory-reading-via-suggest-trie-walk-38629

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-2124

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-2125

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-2304

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-2129

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-2175

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1851

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-2000

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1674

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1968

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-2345

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1735

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1733

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-2183

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1898

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-2344

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-2206

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1720

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-2042

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1942

Trust: 0.3

url:https://ubuntu.com/security/notices/usn-5723-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0413

Trust: 0.2

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1927

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2286

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1886

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1771

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2287

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1621

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2284

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2288

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2257

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1154

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2343

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1381

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2207

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1629

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1616

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2264

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1619

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1620

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:https://security.gentoo.org/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1785

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1796

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1769

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1897

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2289

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1420

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2182

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1160

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2231

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2285

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2208

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2210

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2923

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1725

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0261

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0943

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3796

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0158

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0417

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0407

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0318

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0392

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0368

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0554

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0443

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0714

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3984

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0629

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0393

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0156

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4069

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3927

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0685

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0319

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3974

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0351

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4019

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3968

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0213

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0729

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-46059

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3770

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0359

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3973

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4173

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3872

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3875

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4136

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vim/2:8.0.1453-1ubuntu1.12

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2581

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vim/2:9.0.0242-1ubuntu1.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vim/2:8.1.2269-1ubuntu5.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vim/2:8.2.3995-1ubuntu2.5

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5995-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2845

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2862

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3256

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3296

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3235

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2889

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0051

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2982

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3520

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3099

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2874

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3016

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3278

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-47024

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0054

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4141

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2819

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2946

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0049

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2849

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3324

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2980

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2817

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2522

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3591

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3297

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3352

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3491

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3234

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32866

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32875

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32864

Trust: 0.1

url:https://support.apple.com/en-us/ht201222.

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1622

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39537

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32854

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32881

Trust: 0.1

url:https://support.apple.com/ht213443.

Trust: 0.1

sources: VULHUB: VHN-426195 // VULMON: CVE-2022-2126 // JVNDB: JVNDB-2022-011657 // PACKETSTORM: 168124 // PACKETSTORM: 171681 // PACKETSTORM: 172122 // PACKETSTORM: 169585 // PACKETSTORM: 169832 // CNNVD: CNNVD-202206-1994 // NVD: CVE-2022-2126

CREDITS

Gentoo

Trust: 0.2

sources: PACKETSTORM: 168124 // PACKETSTORM: 172122

SOURCES

db:VULHUBid:VHN-426195
db:VULMONid:CVE-2022-2126
db:JVNDBid:JVNDB-2022-011657
db:PACKETSTORMid:168124
db:PACKETSTORMid:171681
db:PACKETSTORMid:172122
db:PACKETSTORMid:169585
db:PACKETSTORMid:169832
db:CNNVDid:CNNVD-202206-1994
db:NVDid:CVE-2022-2126

LAST UPDATE DATE

2024-11-23T20:39:57.299000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-426195date:2022-10-31T00:00:00
db:VULMONid:CVE-2022-2126date:2022-10-31T00:00:00
db:JVNDBid:JVNDB-2022-011657date:2023-08-23T07:41:00
db:CNNVDid:CNNVD-202206-1994date:2023-05-04T00:00:00
db:NVDid:CVE-2022-2126date:2024-11-21T07:00:22.050

SOURCES RELEASE DATE

db:VULHUBid:VHN-426195date:2022-06-19T00:00:00
db:VULMONid:CVE-2022-2126date:2022-06-19T00:00:00
db:JVNDBid:JVNDB-2022-011657date:2023-08-23T00:00:00
db:PACKETSTORMid:168124date:2022-08-22T16:01:59
db:PACKETSTORMid:171681date:2023-04-04T12:59:12
db:PACKETSTORMid:172122date:2023-05-03T15:29:00
db:PACKETSTORMid:169585date:2022-10-31T14:50:18
db:PACKETSTORMid:169832date:2022-11-15T16:38:43
db:CNNVDid:CNNVD-202206-1994date:2022-06-19T00:00:00
db:NVDid:CVE-2022-2126date:2022-06-19T13:15:07.887