vulnerability
Arch Linux: Stack-based Buffer Overflow (CVE-2022-3324)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Sep 27, 2022 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Sep 27, 2022
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.
Solution
arch-linux-upgrade-latest
References
- CVE-2022-3324
- https://attackerkb.com/topics/CVE-2022-3324
- URL-https://github.com/vim/vim/commit/8279af514ca7e5fd3c31cf13b0864163d1a0bfeb
- URL-https://huntr.dev/bounties/e414e55b-f332-491f-863b-c18dca97403c
- URL-https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- URL-https://security.gentoo.org/glsa/202305-16
- CWE-121
- CWE-787
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.