QID 353203
Date Published: 2022-04-08
QID 353203: Amazon Linux Security Advisory for vim : ALAS-2022-1579
a flaw was found in vim.
The vulnerability occurs due to a crash when recording and using select mode and leads to an out-of-bounds read.
This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution. (
( CVE-2022-0393) a flaw was found in vim.
The vulnerability occurs due to stack corruption when looking for spell suggestions and leads to a stack buffer overflow.
( CVE-2022-0408) a flaw was found in vim.
The vulnerability occurs due to using freed memory when the substitute uses a recursive function call, resulting in a use-after-free vulnerability.
( CVE-2022-0413) a flaw was found in vim.
The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow.
( CVE-2022-0417) a flaw was found in vim.
The vulnerability occurs due to using freed memory which results in a use-after-free vulnerability.
( CVE-2022-0443) a flaw was found in vim that causes an out-of-range pointer offset vulnerability.
( CVE-2022-0554) a heap-based buffer overflow flaw was found in vims ex_retab() function of indent.c file.
This flaw occurs when repeatedly using :retab.
This flaw allows an attacker to trick a user into opening a crafted file triggering a heap-overflow. (
( CVE-2022-0572) a stack-based buffer overflow flaw was found in vims ga_concat_shorten_esc() function of src/testing.c file
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS-2022-1579 -
alas.aws.amazon.com/ALAS-2022-1579.html
CVEs related to QID 353203
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS-2022-1579 | Amazon Linux |
|