QID 354382

Date Published: 2022-12-21

QID 354382: Amazon Linux Security Advisory for vim : ALAS2022-2022-014

a flaw was found in vim.
A possible heap-based buffer overflow vulnerability allows an attacker to input a specially crafted file, leading to a crash or code execution.
The highest threat from this vulnerability is system availability. (
( CVE-2021-4019) vim is vulnerable to use after free (cve-2021-4069) a flaw was found in vim.
A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. (
( CVE-2021-4136) a flaw was found in vim.
( CVE-2021-4166) a flaw was found in vim.
A possible use after free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution. (
( CVE-2021-4173) a flaw was found in vim.
( CVE-2021-4187) it was found that vim was vulnerable to use-after-free flaw in win_linetabsize().
Sourcing a specially crafted file in vim could crash the vim process or possibly lead to other undefined behaviors. (
( CVE-2021-4192) it was found that vim was vulnerable to an out-of-bound read flaw in getvcol().
A specially crafted file could be used to, when opened in vim, disclose some of the processs internal memory. (
( CVE-2021-4193) vim is vulnerable to out-of-bounds read (cve-2022-0128) it was found that vim was vulnerable to use-after-free flaw in the way it was treating allocated lines in user functions.
A specially crafted file could crash the vim process or possibly lead to other undefined behaviors. (
( CVE-2022-0156) it was found that vim was vulnerable to a 1 byte heap based out of bounds read flaw in the `compile_get_env()` function.
A file could use that flaw to disclose 1 byte of vims internal memory. (
( CVE-2022-0158)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-014 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-014 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-014.html