CVE-2025-24014
Published: January 22, 2025Last modified: February 14, 2025
Description
Vim is an open source, command line text editor. A segmentation fault was found in Vim before 9.1.1043. In silent Ex mode (-s -e), Vim typically doesn't show a screen and just operates silently in batch mode. However, it is still possible to trigger the function that handles the scrolling of a gui version of Vim by feeding some binary characters to Vim. The function that handles the scrolling however may be triggering a redraw, which will access the ScreenLines pointer, even so this variable hasn't been allocated (since there is no screen). This vulnerability is fixed in 9.1.1043.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.2 |
Attack Vector | LOCAL |
Attack complexity | HIGH |
Privileges required | LOW |
User interaction | REQUIRED |
Scope | UNCHANGED |
Confidentiality | LOW |
Integrity impact | LOW |
Availability impact | LOW |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | vim | Fixed (9.1.1105-r0) |
Stream | vim | Fixed (9.1.1105-r0) |
References
- http://www.openwall.com/lists/oss-security/2025/01/20/4
- http://www.openwall.com/lists/oss-security/2025/01/21/1
- https://github.com/vim/vim/commit/9d1bed5eccdbb46a26b8a484f5e9163c40e63919
- https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955
- https://security.netapp.com/advisory/ntap-20250314-0005/