QID 354085

Date Published: 2022-10-25

QID 354085: Amazon Linux Security Advisory for vim : ALAS-2022-1639

a flaw was found in vim, which is vulnerable to an out-of-bounds read in the msg_outtrans_special function.
This flaw allows a specially crafted file to crash software or execute code when opened in vim. (
( CVE-2022-2257) a heap buffer overflow vulnerability was found in vims inc() function of misc2.c.
This issue occurs because vim reads beyond the end of the line with a put command.
This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes a crash in the cli tool. (
( CVE-2022-2264) heap-based buffer overflow in github repository vim/vim prior to 9.0. (
( CVE-2022-2284) integer overflow or wraparound in github repository vim/vim prior to 9.0. (
( CVE-2022-2285) out-of-bounds read in github repository vim/vim prior to 9.0. (
( CVE-2022-2286) out-of-bounds read in github repository vim/vim prior to 9.0. (
( CVE-2022-2287) out-of-bounds write in github repository vim/vim prior to 9.0. (
( CVE-2022-2288) use after free in github repository vim/vim prior to 9.0. (
( CVE-2022-2289) a stack-based buffer overflow vulnerability was found in vims spell_dump_compl() function of the src/spell.c file.
This issue occurs because the spell dump goes beyond the end of an array when crafted input is processed.
This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory. (
( CVE-2022-2304) a heap-based buffer overflow was found in vim in the ins_compl_add function in the insexpand.c file.
( CVE-2022-2817) a flaw was found in vim.
( CVE-2022-3037)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-1639 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-1639 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2022-1639.html