QID 353944

Date Published: 2022-06-09

QID 353944: Amazon Linux Security Advisory for vim : ALAS2-2022-1805

a flaw was found in vim.
The vulnerability occurs due to a crash when recording and using select mode and leads to an out-of-bounds read.
This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution. (
( CVE-2022-0393) a flaw was found in vim.
The vulnerability occurs due to stack corruption when looking for spell suggestions and leads to a stack buffer overflow.
( CVE-2022-0408) a flaw was found in vim.
The vulnerability occurs due to using freed memory when the substitute uses a recursive function call, resulting in a use-after-free vulnerability.
( CVE-2022-0413) a flaw was found in vim.
The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow.
( CVE-2022-0417) a flaw was found in vim.
The vulnerability occurs due to using freed memory which results in a use-after-free vulnerability.
( CVE-2022-0443) a flaw was found in vim that causes an out-of-range pointer offset vulnerability.
( CVE-2022-0554) a heap-based buffer overflow flaw was found in vims ex_retab() function of indent.c file.
This flaw occurs when repeatedly using :retab.
This flaw allows an attacker to trick a user into opening a crafted file triggering a heap-overflow. (
( CVE-2022-0572) a stack-based buffer overflow flaw was found in vims ga_concat_shorten_esc() function of src/testing.c file.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2022-1805 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2022-1805 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2022-1805.html