Mercurial > vim
view src/proto/cmdhist.pro @ 33863:3b8089d550eb v9.0.2141
patch 9.0.2141: [security]: buffer-overflow in suggest_trie_walk
Commit: https://github.com/vim/vim/commit/0fb375aae608d7306b4baf9c1f906961f32e2abf
Author: Christian Brabandt <cb@256bit.org>
Date: Wed Nov 29 10:23:39 2023 +0100
patch 9.0.2141: [security]: buffer-overflow in suggest_trie_walk
Problem: [security]: buffer-overflow in suggest_trie_walk
Solution: Check n before using it as index into byts array
Basically, n as an index into the byts array, can point to beyond the byts
array. So let's double check, that n is within the expected range after
incrementing it from sp->ts_curi and bail out if it would be invalid.
Reported by @henices, thanks!
Signed-off-by: Christian Brabandt <cb@256bit.org>
author | Christian Brabandt <cb@256bit.org> |
---|---|
date | Sun, 10 Dec 2023 15:16:03 +0100 |
parents | 05b240971884 |
children | ffeda71f42d7 |
line wrap: on
line source
/* cmdhist.c */ int get_hislen(void); histentry_T *get_histentry(int hist_type); void set_histentry(int hist_type, histentry_T *entry); int *get_hisidx(int hist_type); int *get_hisnum(int hist_type); int hist_char2type(int c); char_u *get_history_arg(expand_T *xp, int idx); void init_history(void); void clear_hist_entry(histentry_T *hisptr); int in_history(int type, char_u *str, int move_to_front, int sep, int writing); void add_to_history(int histype, char_u *new_entry, int in_map, int sep); void f_histadd(typval_T *argvars, typval_T *rettv); void f_histdel(typval_T *argvars, typval_T *rettv); void f_histget(typval_T *argvars, typval_T *rettv); void f_histnr(typval_T *argvars, typval_T *rettv); void remove_key_from_history(void); void ex_history(exarg_T *eap); /* vim: set ft=c : */