comparison src/version.c @ 33776:9503dc55b5ed v9.0.2108

patch 9.0.2108: [security]: overflow with count for :s command Commit: https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78 Author: Christian Brabandt <cb@256bit.org> Date: Tue Nov 14 20:45:48 2023 +0100 patch 9.0.2108: [security]: overflow with count for :s command Problem: [security]: overflow with count for :s command Solution: Abort the :s command if the count is too large If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Adds a test with INT_MAX as count and verify it correctly fails. It seems the return value on Windows using mingw compiler wraps around, so the initial test using :s/./b/9999999999999999999999999990 doesn't fail there, since the count is wrapping around several times and finally is no longer larger than 2147483647. So let's just use 2147483647 in the test, which hopefully will always cause a failure Signed-off-by: Christian Brabandt <cb@256bit.org>
author Christian Brabandt <cb@256bit.org>
date Thu, 16 Nov 2023 22:15:10 +0100
parents f2dd85a2bfc0
children 06ad070cda83
comparison
equal deleted inserted replaced
33775:7109d1c57221 33776:9503dc55b5ed
702 NULL 702 NULL
703 }; 703 };
704 704
705 static int included_patches[] = 705 static int included_patches[] =
706 { /* Add new patch number below this line */ 706 { /* Add new patch number below this line */
707 /**/
708 2108,
707 /**/ 709 /**/
708 2107, 710 2107,
709 /**/ 711 /**/
710 2106, 712 2106,
711 /**/ 713 /**/