Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"146200493773228420153804765641940418619",
"295957853604481578401542256480342274950",
"143087279238525360606364042469929212938",
"32640677102677746719902546728464723531"
]
},
"target": {
"file": "src/version.c"
},
"signature_version": "v1",
"id": "CVE-2022-1616-19bed754",
"deprecated": false,
"source": "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"198016461449000150231175552777544331240",
"171590059231393512042216955171149850878",
"316686136004962099024228210453394012582",
"15210692249140618194474647794668422768",
"147419277426255274610267039372053766845",
"145063143628024854754152831816492852915",
"69805306449089086225822973507550347559",
"45219349205717403857699249625592224925"
]
},
"target": {
"file": "src/ex_docmd.c"
},
"signature_version": "v1",
"id": "CVE-2022-1616-7dc43a7a",
"deprecated": false,
"source": "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "56774900917297562489151985595807997678",
"length": 391.0
},
"target": {
"file": "src/ex_docmd.c",
"function": "append_command"
},
"signature_version": "v1",
"id": "CVE-2022-1616-dda937cb",
"deprecated": false,
"source": "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c"
}
]