neovim is vulnerable to arbitrary code execution. An integer overflow during unserialize_uep
memory allocation due to improper validation for for tree length when reading a corrupted undo file allows an attacker to execute arbitrary code on the host OS via a buffer overflow.
CPE | Name | Operator | Version |
---|---|---|---|
neovim:stretch | eq | 0.1.7-4+deb9u1 | |
neovim:stretch | eq | 0.1.7-4+deb9u1 |
www.securityfocus.com/bid/96448
www.securitytracker.com/id/1037949
github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75
groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q
groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y
security-tracker.debian.org/tracker/CVE-2017-6350
security.gentoo.org/glsa/201706-26