Vim is an open source, command line text editor. A segmentation fault was found in Vim before 9.1.1043. In silent Ex mode (-s -e), Vim typically doesn't show a screen and just operates silently in batch mode. However, it is still possible to trigger the function that handles the scrolling of a gui version of Vim by feeding some binary characters to Vim. The function that handles the scrolling however may be triggering a redraw, which will access the ScreenLines pointer, even so this variable hasn't been allocated (since there is no screen). This vulnerability is fixed in 9.1.1043.
References
| Link | Resource |
|---|---|
| https://github.com/vim/vim/commit/9d1bed5eccdbb46a26b8a484f5e9163c40e63919 | Patch |
| https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/01/20/4 | Mailing List |
| http://www.openwall.com/lists/oss-security/2025/01/21/1 | Mailing List |
| https://security.netapp.com/advisory/ntap-20250314-0005/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-01-20 23:15
Updated : 2025-08-14 01:40
NVD link : CVE-2025-24014
Mitre link : CVE-2025-24014
CVE.ORG link : CVE-2025-24014
JSON object : View
Products Affected
netapp
- hci_compute_node
- hci_compute_node_firmware
vim
- vim
CWE
CWE-787
Out-of-bounds Write
