QID 354033

Date Published: 2022-08-08

QID 354033: Amazon Linux Security Advisory for vim : ALAS-2022-1628

use after free in append_command in github repository vim/vim prior to 8.2.4895.
This vulnerability is capable of crashing software, bypass protection mechanism, modify memory, and possible remote execution (cve-2022-1616) heap-based buffer overflow in function cmdline_erase_chars in github repository vim/vim prior to 8.2.4899.
This vulnerabilities are capable of crashing software, modify memory, and possible remote execution (cve-2022-1619) null pointer dereference in function vim_regexec_string at regexp.c:2729 in github repository vim/vim prior to 8.2.4901.
Null pointer dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input. (
( CVE-2022-1620) heap buffer overflow in vim_strncpy find_word in github repository vim/vim prior to 8.2.4919.
This vulnerability is capable of crashing software, bypass protection mechanism, modify memory, and possible remote execution (cve-2022-1621) buffer over-read in function find_next_quote in github repository vim/vim prior to 8.2.4925.
This vulnerabilities are capable of crashing software, modify memory, and possible remote execution (cve-2022-1629) a null pointer dereference flaw was found in vims vim_regexec_string() function in regexp.c file.
The issue occurs when the function tries to match the buffer with an invalid pattern.
This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a null pointer dereference that causes an application to crash, leading to a denial of service. (
( CVE-2022-1674) a heap buffer over-read vulnerability was found in vims grab_file_name() function of the src/findfile.c file.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-1628 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-1628 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2022-1628.html