vim is vulnerable to stack-based buffer overflow. The vulnerability exists in win_redr_ruler()
function of drawscreen.c
because of using a negative array index with a negative width window which allows an attacker to trick a user into opening a specially malicious file causing an application to crash.
access.redhat.com/security/cve/cve-2022-3324
github.com/vim/vim/commit/8279af514ca7e5fd3c31cf13b0864163d1a0bfeb
huntr.dev/bounties/e414e55b-f332-491f-863b-c18dca97403c
lists.debian.org/debian-lts-announce/2022/11/msg00009.html
lists.fedoraproject.org/archives/list/[email protected]/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
lists.fedoraproject.org/archives/list/[email protected]/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
lists.fedoraproject.org/archives/list/[email protected]/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
security-tracker.debian.org/tracker/CVE-2022-3324
security.gentoo.org/glsa/202305-16