Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-0049: patch 9.0.1143: invalid memory access with bad 'statusline' value · vim/vim@7b17eb4

Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.

CVE
#vulnerability#git

Skip to content

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

*   Explore
*   All features
*   Documentation
*   GitHub Skills
*   Blog
    • For

    • Enterprise

    • Teams

    • Startups

    • Education

    • By Solution

    • CI/CD & Automation

    • DevOps

    • DevSecOps

    • Case Studies

    • Customer Stories

    • Resources

    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

*   Repositories
*   Topics
*   Trending
*   Collections
  • Pricing

  • Notifications

  • Fork 4.5k

  • Code

  • Issues 1.2k

  • Pull requests 146

  • Actions

  • Projects

  • Wiki

  • Security

  • Insights

Permalink

Browse files

patch 9.0.1143: invalid memory access with bad ‘statusline’ value

Problem: Invalid memory access with bad ‘statusline’ value. Solution: Avoid going over the NUL at the end.

  • Loading branch information

1 parent f057171 commit 7b17eb4b063a234376c1ec909ee293e42cff290c

Showing 3 changed files with 11 additions and 0 deletions.

    • buffer.c
      • test_statusline.vim
    • version.c

@@ -4617,6 +4617,8 @@ build_stl_str_hl(

#endif

if (vim_strchr(STL_ALL, *s) == NULL)

{

if (*s == NUL) // can happen with “%0”

break;

s++;

continue;

}

@@ -440,6 +440,13 @@ func Test_statusline()

set splitbelow&

endfunc

func Test_statusline_trailing_percent_zero()

" this was causing illegal memory access

set laststatus=2 stl=%!%0

call assert_fails('redraw’, ‘E15: Invalid expression: "%0"’)

set laststatus& stl&

endfunc

func Test_statusline_visual()

func CallWordcount()

call wordcount()

@@ -695,6 +695,8 @@ static char *(features[]) =

static int included_patches[] =

{ /* Add new patch number below this line */

/**/

1143,

/**/

1142,

/**/

0 comments on commit 7b17eb4

Please sign in to comment.

Related news

CVE-2023-28190: About the security content of macOS Ventura 13.3

A privacy issue was addressed by moving sensitive data to a more secure location. This issue is fixed in macOS Ventura 13.3. An app may be able to access user-sensitive data

Gentoo Linux Security Advisory 202305-16

Gentoo Linux Security Advisory 202305-16 - Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. Versions less than 9.0.1157 are affected.

Ubuntu Security Notice USN-5963-1

Ubuntu Security Notice 5963-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10.

Ubuntu Security Notice USN-5836-1

Ubuntu Security Notice 5836-1 - It was discovered that Vim was not properly performing memory management operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907