|
|
Message-ID: <ZV5u0W1aT9xFCSTK@256bit.org>
Date: Wed, 22 Nov 2023 22:12:49 +0100
From: Christian Brabandt <cb@...bit.org>
To: oss-sec <oss-security@...ts.openwall.com>
Subject: [vim-security] use-after-free in ex_substitute in Vim < v9.0.2121
CVE-2023-48706: Use-After-Free in ex_substitute()
=================================================
Date: 22.11.2023
Severity: Low
When executing a :s command for the very first time and using a
sub-replace-special atom inside the substitution part, it is possible
that the recursive :s call causes freeing of memory which may later then
be accessed by the initial :s command.
Impact is low since the user must intentionally execute the payload and
the whole process is a bit tricky to do (since it seems to work only
reliably for the very first :s command). It may also cause a crash of
Vim.
The Vim project would like to thank github user gandalf4a for reporting
this issue which is now fixed in Vim patch 9.0.2121.
URLs: https://github.com/vim/vim/commit/26c11c56888d01e298cd8044caf8
https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q
Thanks,
Christian
--
Wie man sein Kind nicht nennen sollte:
Jupp Heidi
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.