Amazon Linux 1 Security Advisory: ALAS-2022-1557
Advisory Release Date: 2022-01-18 20:12 Pacific
Advisory Updated Date: 2024-05-09 17:43 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-05-09: CVE-2020-20703 was added to this advisory.
Buffer Overflow vulnerability in VIM v.8.1.2135 allows a remote attacker to execute arbitrary code via the operand parameter. (CVE-2020-20703)
vim is vulnerable to Heap-based Buffer Overflow (CVE-2021-3903)
A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-3927)
A flaw was found in vim. A possible stack-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-3928)
A flaw was found in vim. A possible heap use-after-free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability. (CVE-2021-3968)
A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability. (CVE-2021-3973)
A flaw was found in vim. A possible use-after-free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability. (CVE-2021-3974)
A flaw was found in vim. A possible heap-based buffer overflow allows an attacker to input a specially crafted file, leading to a crash or code execution. The highest threat from this vulnerability is confidentiality, integrity, and system availability. (CVE-2021-3984)
A flaw was found in vim. A possible heap-based buffer overflow vulnerability allows an attacker to input a specially crafted file, leading to a crash or code execution. The highest threat from this vulnerability is system availability. (CVE-2021-4019)
vim is vulnerable to Use After Free (CVE-2021-4069)
A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. (CVE-2021-4136)
A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. (CVE-2021-4166)
A flaw was found in vim. A possible use after free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution. (CVE-2021-4173)
A flaw was found in vim. A possible use after free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution. (CVE-2021-4187)
It was found that vim was vulnerable to use-after-free flaw in win_linetabsize(). Sourcing a specially crafted file in vim could crash the vim process or possibly lead to other undefined behaviors. (CVE-2021-4192)
It was found that vim was vulnerable to an out-of-bound read flaw in getvcol(). A specially crafted file could be used to, when opened in vim, disclose some of the process's internal memory. (CVE-2021-4193)
Affected Packages:
vim
Issue Correction:
Run yum update vim to update your system.
i686:
vim-minimal-8.2.4006-1.1.amzn1.i686
vim-enhanced-8.2.4006-1.1.amzn1.i686
vim-common-8.2.4006-1.1.amzn1.i686
vim-debuginfo-8.2.4006-1.1.amzn1.i686
noarch:
vim-data-8.2.4006-1.1.amzn1.noarch
vim-filesystem-8.2.4006-1.1.amzn1.noarch
src:
vim-8.2.4006-1.1.amzn1.src
x86_64:
vim-enhanced-8.2.4006-1.1.amzn1.x86_64
vim-minimal-8.2.4006-1.1.amzn1.x86_64
vim-debuginfo-8.2.4006-1.1.amzn1.x86_64
vim-common-8.2.4006-1.1.amzn1.x86_64