Headline
CVE-2023-0049: patch 9.0.1143: invalid memory access with bad 'statusline' value · vim/vim@7b17eb4
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
* Explore
* All features
* Documentation
* GitHub Skills
* Blog
For
Enterprise
Teams
Startups
Education
By Solution
CI/CD & Automation
DevOps
DevSecOps
Case Studies
Customer Stories
Resources
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
* Repositories
* Topics
* Trending
* Collections
Pricing
Notifications
Fork 4.5k
Code
Issues 1.2k
Pull requests 146
Actions
Projects
Wiki
Security
Insights
Permalink
Browse files
patch 9.0.1143: invalid memory access with bad ‘statusline’ value
Problem: Invalid memory access with bad ‘statusline’ value. Solution: Avoid going over the NUL at the end.
- Loading branch information
1 parent f057171 commit 7b17eb4b063a234376c1ec909ee293e42cff290c
Showing 3 changed files with 11 additions and 0 deletions.
- buffer.c
- test_statusline.vim
- version.c
@@ -4617,6 +4617,8 @@ build_stl_str_hl(
#endif
if (vim_strchr(STL_ALL, *s) == NULL)
{
if (*s == NUL) // can happen with “%0”
break;
s++;
continue;
}
@@ -440,6 +440,13 @@ func Test_statusline()
set splitbelow&
endfunc
func Test_statusline_trailing_percent_zero()
" this was causing illegal memory access
set laststatus=2 stl=%!%0
call assert_fails('redraw’, ‘E15: Invalid expression: "%0"’)
set laststatus& stl&
endfunc
func Test_statusline_visual()
func CallWordcount()
call wordcount()
@@ -695,6 +695,8 @@ static char *(features[]) =
static int included_patches[] =
{ /* Add new patch number below this line */
/**/
1143,
/**/
1142,
/**/
0 comments on commit 7b17eb4
Please sign in to comment.
Related news
A privacy issue was addressed by moving sensitive data to a more secure location. This issue is fixed in macOS Ventura 13.3. An app may be able to access user-sensitive data
Gentoo Linux Security Advisory 202305-16 - Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. Versions less than 9.0.1157 are affected.
Ubuntu Security Notice 5963-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10.
Ubuntu Security Notice 5836-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.