ALAS2-2022-1771

Related Vulnerabilities: CVE-2022-0554   CVE-2022-0572   CVE-2022-0629   CVE-2022-0685   CVE-2022-0696  

A flaw was found in vim that causes an out-of-range pointer offset vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution. (CVE-2022-0554) A heap-based buffer overflow flaw was found in vim's ex_retab() function of indent.c file. This flaw occurs when repeatedly using :retab. This flaw allows an attacker to trick a user into opening a crafted file triggering a heap-overflow. (CVE-2022-0572) A stack-based buffer overflow flaw was found in vim's ga_concat_shorten_esc() function of src/testing.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a stack-overflow. This issue can lead to an application crash, causing a denial of service. (CVE-2022-0629) A flaw was found in vim. The vulnerability occurs due to a crash when using a special multi-byte character and leads to an out-of-range vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution. (CVE-2022-0685) A NULL pointer dereference flaw was found in vim's find_ucmd() function of usercmd.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a NULL pointer dereference. This issue leads to an application crash, causing a denial of service. (CVE-2022-0696)

ALAS2-2022-1771


Amazon Linux 2 Security Advisory: ALAS-2022-1771
Advisory Release Date: 2022-04-04 23:23 Pacific
Advisory Updated Date: 2022-04-06 23:14 Pacific
Severity: Medium

Issue Overview:

A flaw was found in vim that causes an out-of-range pointer offset vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution. (CVE-2022-0554)

A heap-based buffer overflow flaw was found in vim's ex_retab() function of indent.c file. This flaw occurs when repeatedly using :retab. This flaw allows an attacker to trick a user into opening a crafted file triggering a heap-overflow. (CVE-2022-0572)

A stack-based buffer overflow flaw was found in vim's ga_concat_shorten_esc() function of src/testing.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a stack-overflow. This issue can lead to an application crash, causing a denial of service. (CVE-2022-0629)

A flaw was found in vim. The vulnerability occurs due to a crash when using a special multi-byte character and leads to an out-of-range vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution. (CVE-2022-0685)

A NULL pointer dereference flaw was found in vim's find_ucmd() function of usercmd.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a NULL pointer dereference. This issue leads to an application crash, causing a denial of service. (CVE-2022-0696)


Affected Packages:

vim


Issue Correction:
Run yum update vim to update your system.

New Packages:
aarch64:
    vim-common-8.2.4428-1.amzn2.0.3.aarch64
    vim-minimal-8.2.4428-1.amzn2.0.3.aarch64
    vim-enhanced-8.2.4428-1.amzn2.0.3.aarch64
    vim-X11-8.2.4428-1.amzn2.0.3.aarch64
    vim-debuginfo-8.2.4428-1.amzn2.0.3.aarch64

i686:
    vim-common-8.2.4428-1.amzn2.0.3.i686
    vim-minimal-8.2.4428-1.amzn2.0.3.i686
    vim-enhanced-8.2.4428-1.amzn2.0.3.i686
    vim-X11-8.2.4428-1.amzn2.0.3.i686
    vim-debuginfo-8.2.4428-1.amzn2.0.3.i686

noarch:
    vim-filesystem-8.2.4428-1.amzn2.0.3.noarch
    vim-data-8.2.4428-1.amzn2.0.3.noarch

src:
    vim-8.2.4428-1.amzn2.0.3.src

x86_64:
    vim-common-8.2.4428-1.amzn2.0.3.x86_64
    vim-minimal-8.2.4428-1.amzn2.0.3.x86_64
    vim-enhanced-8.2.4428-1.amzn2.0.3.x86_64
    vim-X11-8.2.4428-1.amzn2.0.3.x86_64
    vim-debuginfo-8.2.4428-1.amzn2.0.3.x86_64