Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Z47IfZiDnNqGAmCt@256bit.org>
Date: Mon, 20 Jan 2025 23:04:45 +0100
From: Christian Brabandt <cb@...bit.org>
To: oss-security@...ts.openwall.com
Subject: Subject: [vim-security] segmentation fault in win_line() in Vim <
 9.1.1043

segmentation fault in win_line() in Vim < 9.1.1043
==================================================
Date: 20.01.2025
Severity: Medium
CVE: CVE-2025-24014
CWE: Out-of-bounds Write (CWE-787)

In silent Ex mode (-s -e), Vim typically doesn't show a screen and just
operates silently in batch mode. However, it is still possible to
trigger the function that handles the scrolling of a gui version of Vim
by feeding some binary characters to Vim. The function that handles the
scrolling however may be triggering a redraw, which will access the
ScreenLines pointer, even so this variable hasn't been allocated
(since there is no screen).

In Patch 9.1.1043 Vim will therefore skip the redraw attempt, by testing
whether the ScreenLines pointer is NULL.

Impact is medium since the user must intentionally and explicitly feed
some binary data to Vim in ex mode.

The Vim project would like to thank github user @fizz-is-on-the-way
for reporting this issue.

The issue has been fixed as of Vim patch v9.1.1003

References:
https://github.com/vim/vim/commit/9d1bed5eccdbb46a26b8a484f5e9163c40e63919
https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955

Thanks,
Christian
-- 
Catharsis is something I associate with pornography and crossword puzzles.
		-- Howard Chaykin

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.