CVE-2022-228903.07.2022, 15:15Use After Free in GitHub repository vim/vim prior to 9.0.EnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST7.8 HIGHLOCALLOWNONECVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H@huntrdevCNA7.8 HIGHLOCALLOWNONECVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 22%VendorProductVersionvimvim𝑥< 9.0.0026𝑥= Vulnerable software versionsDebian ReleasesDebian ProductCodenamevimbullseyeunimportantbookworm2:9.0.1378-2fixedsid2:9.1.0777-1fixedtrixie2:9.1.0777-1fixedUbuntu ReleasesUbuntu ProductCodenamevimlunarnot-affectedkineticignoredjammyFixed 2:8.2.3995-1ubuntu2.10releasedimpishignoredfocalFixed 2:8.1.2269-1ubuntu5.16releasedbionicFixed 2:8.0.1453-1ubuntu1.13+esm3releasedxenialFixed 2:7.4.1689-3ubuntu1.5+esm19releasedtrustyFixed 2:7.4.052-1ubuntu3.1+esm11releasedKnown Exploits!https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64Common Weakness EnumerationCWE-416 - Use After FreeReferencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Referenceshttps://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649ehttps://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/https://security.gentoo.org/glsa/202208-32https://security.gentoo.org/glsa/202305-16https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649ehttps://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/https://security.gentoo.org/glsa/202208-32https://security.gentoo.org/glsa/202305-16