Package: vim / 2:9.0.1378-2+deb12u2
Metadata
Package | Version | Patches format |
---|---|---|
vim | 2:9.0.1378-2+deb12u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
debian/Support sourcing a vimrc.tiny when Vim is invoked as vi.patch | (download) |
src/main.c |
23 22 + 1 - 0 ! |
support sourcing a vimrc.tiny when vim is invoked as vi This is used only in the vim-tiny package to allow a specific configuration for vim-tiny's vi. The vim-tiny package is substantially |
debian/Detect the rst filetype using the contents of the file.patch | (download) |
runtime/autoload/dist/script.vim |
8 8 + 0 - 0 ! |
detect the rst filetype using the contents of the file Closes: #382541 |
debian/Add recognition of more LaTeX commands for tex filetype d.patch | (download) |
runtime/autoload/dist/ft.vim |
2 1 + 1 - 0 ! |
add recognition of more latex commands for tex filetype detection Since filetype detection of TeX files defaults to plaintex, we've added detection of some additional LaTeX commands to help sway the detection to LaTeX. Closes: #384479 Signed-off-by: James McCoy <jamessan@debian.org> |
debian/Document Debian s decision to disable modelines by defaul.patch | (download) |
runtime/doc/options.txt |
2 1 + 1 - 0 ! |
document debian's decision to disable modelines by default Modelines have historically been a source of vulnerabilities in Vim. As long as it remains a "blacklist suspected/proven dangerous options" instead of a "whitelist allowed options" piece of functionality, Debian's system-wide vimrc will maintain this setting. As such, the documentation needs to be updated to reflect the induced behavior. Closes: #472522 Signed-off-by: James McCoy <jamessan@debian.org> |
patch 9.0.1499 using uninitialized memory with fuzzy matc.patch | (download) |
src/quickfix.c |
5 4 + 1 - 0 ! |
patch 9.0.1499: using uninitialized memory with fuzzy matching Problem: Using uninitialized memory with fuzzy matching. Solution: Initialize the arrays used to store match positions. Closes: #1035323 |
Fix GH 267 where indent after a sub would not work.patch | (download) |
runtime/indent/perl.vim |
1 1 + 0 - 0 ! |
fix gh#267 where indent after a sub would not work Closes: #1034529 Signed-off-by: James McCoy <jamessan@debian.org> |
CVE 2023 2610.patch | (download) |
src/regexp.c |
30 19 + 11 - 0 ! |
patch 9.0.1532: crash when expanding "~" in substitute causes very long text Problem: Crash when expanding "~" in substitute causes very long text. Solution: Limit the text length to MAXCOL. (cherry picked from commit ab9a2d884b3a4abe319606ea95a5a6d6b01cd73a) |
CVE 2023 4738.patch | (download) |
src/ex_cmds.c |
3 3 + 0 - 0 ! |
patch 9.0.1848: [security] buffer-overflow in vim_regsub_both() Problem: buffer-overflow in vim_regsub_both() Solution: Check remaining space Signed-off-by: Christian Brabandt <cb@256bit.org> (cherry picked from commit ced2c7394aafdc90fb7845e09b3a3fee23d48cb1) |
CVE 2023 4752.patch | (download) |
src/insexpand.c |
2 1 + 1 - 0 ! |
patch 9.0.1858: [security] heap use after free in ins_compl_get_exp() Problem: heap use after free in ins_compl_get_exp() Solution: validate buffer before accessing it Signed-off-by: Christian Brabandt <cb@256bit.org> (cherry picked from commit ee9166eb3b41846661a39b662dc7ebe8b5e15139) |
CVE 2023 4781.patch | (download) |
src/ex_cmds.c |
3 3 + 0 - 0 ! |
patch 9.0.1873: [security] heap-buffer-overflow in vim_regsub_both Problem: heap-buffer-overflow in vim_regsub_both Solution: Disallow exchanging windows when textlock is active Signed-off-by: Christian Brabandt <cb@256bit.org> (cherry picked from commit f6d28fe2c95c678cc3202cc5dc825a3fcc709e93) |
CVE 2023 5344.patch | (download) |
src/message.c |
2 1 + 1 - 0 ! |
patch 9.0.1969: [security] buffer-overflow in trunc_string() Problem: buffer-overflow in trunc_string() Solution: Add NULL at end of buffer Currently trunc_string() assumes that when the string is too long, buf[e-1] will always be writeable. But that assumption may not always be true. The condition currently looks like this else if (e + 3 < buflen) [...] else { // can't fit in the "...", just truncate it buf[e - 1] = NUL; } but this means, we may run into the last else clause with e still being larger than buflen. So a buffer overflow occurs. So instead of using `buf[e - 1]`, let's just always truncate at `buf[buflen - 1]` which should always be writable. Signed-off-by: Christian Brabandt <cb@256bit.org> (cherry picked from commit 3bd7fa12e146c6051490d048a4acbfba974eeb04) |
CVE 2024 22667.patch | (download) |
src/map.c |
2 1 + 1 - 0 ! |
patch 9.0.2142: [security]: stack-buffer-overflow in option callback functions Problem: [security]: stack-buffer-overflow in option callback functions Solution: pass size of errbuf down the call stack, use snprintf() instead of sprintf() We pass the error buffer down to the option callback functions, but in some parts of the code, we simply use sprintf(buf) to write into the error buffer, which can overflow. So let's pass down the length of the error buffer and use sprintf(buf, size) instead. Reported by @henices, thanks! Signed-off-by: Christian Brabandt <cb@256bit.org> (cherry picked from commit b39b240c386a5a29241415541f1c99e2e6b8ce47) |
CVE 2024 43802.patch | (download) |
src/getchar.c |
15 12 + 3 - 0 ! |
patch 9.1.0697: [security]: heap-buffer-overflow in ins_typebuf Problem: heap-buffer-overflow in ins_typebuf (SuyueGuo) Solution: When flushing the typeahead buffer, validate that there is enough space left Github Advisory: https://github.com/vim/vim/security/advisories/GHSA-4ghr-c62x-cqfh Signed-off-by: Christian Brabandt <cb@256bit.org> (cherry picked from commit 322ba9108612bead5eb7731ccb66763dec69ef1b) |
CVE 2024 47814.patch | (download) |
src/buffer.c |
6 6 + 0 - 0 ! |
patch 9.1.0764: [security]: use-after-free when closing a buffer Problem: [security]: use-after-free when closing a buffer Solution: When splitting the window and editing a new buffer, check whether the newly to be edited buffer has been marked for deletion and abort in this case Github Advisory: https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg Signed-off-by: Christian Brabandt <cb@256bit.org> (cherry picked from commit 51b62387be93c65fa56bbabe1c3c1ea5df187641) |