vulnerability

Amazon Linux 2023: CVE-2024-22667: Medium priority package update for vim

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Feb 5, 2024
Added
Feb 17, 2025
Modified
Dec 4, 2025

Description

Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.
A stack-based buffer overflow flaw was found in Vim. The did_set_langmap function in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions. That buffer can be overflown, possibly leading to memory corruption and escalation of privileges.

Solutions

amazon-linux-2023-upgrade-vim-commonamazon-linux-2023-upgrade-vim-dataamazon-linux-2023-upgrade-vim-debuginfoamazon-linux-2023-upgrade-vim-debugsourceamazon-linux-2023-upgrade-vim-default-editoramazon-linux-2023-upgrade-vim-enhancedamazon-linux-2023-upgrade-vim-enhanced-debuginfoamazon-linux-2023-upgrade-vim-filesystemamazon-linux-2023-upgrade-vim-minimalamazon-linux-2023-upgrade-vim-minimal-debuginfoamazon-linux-2023-upgrade-xxdamazon-linux-2023-upgrade-xxd-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.