logo
DATABASE RESOURCES PRICING ABOUT US

Amazon Linux 2022 : (ALAS2022-2022-116)

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2022-2022-116 advisory. - Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. (CVE-2022-1720) - Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977. (CVE-2022-1785) - Use After Free in GitHub repository vim/vim prior to 8.2.4979. (CVE-2022-1796) - Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. (CVE-2022-1851, CVE-2022-2126, CVE-2022-2183, CVE-2022-2206) - Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. (CVE-2022-1886, CVE-2022-1942, CVE-2022-2125, CVE-2022-2182, CVE-2022-2207) - Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. (CVE-2022-1897, CVE-2022-2000, CVE-2022-2129, CVE-2022-2210) - Use After Free in GitHub repository vim/vim prior to 8.2. (CVE-2022-1898, CVE-2022-1968, CVE-2022-2042) - Buffer Over-read in GitHub repository vim/vim prior to 8.2. (CVE-2022-1927, CVE-2022-2124, CVE-2022-2175) - NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163. (CVE-2022-2208) - NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2. (CVE-2022-2231) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Related