Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-0413: patch 8.2.4253: using freed memory when substitute with function call · vim/vim@37f4795

Use After Free in GitHub repository vim/vim prior to 8.2.

CVE
#git#c++

@@ -3687,6 +3687,7 @@ ex_substitute(exarg_T *eap) int save_do_all; // remember user specified ‘g’ flag int save_do_ask; // remember user specified ‘c’ flag char_u *pat = NULL, *sub = NULL; // init for GCC char_u *sub_copy = NULL; int delimiter; int sublen; int got_quit = FALSE; @@ -3980,11 +3981,20 @@ ex_substitute(exarg_T *eap) sub_firstline = NULL;
/* * ~ in the substitute pattern is replaced with the old pattern. * We do it here once to avoid it to be replaced over and over again. * But don’t do it when it starts with "\=", then it’s an expression. * If the substitute pattern starts with “\=” then it’s an expression. * Make a copy, a recursive function may free it. * Otherwise, ‘~’ in the substitute pattern is replaced with the old * pattern. We do it here once to avoid it to be replaced over and over * again. */ if (!(sub[0] == ‘\\’ && sub[1] == ‘=’)) if (sub[0] == ‘\\’ && sub[1] == ‘=’) { sub = vim_strsave(sub); if (sub == NULL) return; sub_copy = sub; } else sub = regtilde(sub, magic_isset());
/* @@ -4790,6 +4800,7 @@ ex_substitute(exarg_T *eap) #endif
vim_regfree(regmatch.regprog); vim_free(sub_copy);
// Restore the flag values, they can be used for ":&&". subflags.do_all = save_do_all;

Related news

CVE-2023-28069: DSA-2022-258: Dell Streaming Data Platform Security Update for Multiple Third-Party Component Vulnerabilities

Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.

Ubuntu Security Notice USN-5995-1

Ubuntu Security Notice 5995-1 - It was discovered that Vim incorrectly handled memory when opening certain files. If an attacker could trick a user into opening a specially crafted file, it could cause Vim to crash, or possible execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

Gentoo Linux Security Advisory 202208-32

Gentoo Linux Security Advisory 202208-32 - Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. Versions less than 9.0.0060 are affected.

CVE-2022-29085: DSA-2022-021: Dell Unity, Dell UnityVSA, and Dell Unity XT Security Update for Multiple Vulnerabilities

Dell Unity, Dell UnityVSA, and Dell Unity XT versions prior to 5.2.0.0.5.173 contain a plain-text password storage vulnerability when certain off-array tools are run on the system. The credentials of a user with high privileges are stored in plain text. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907