mirror of
https://github.com/vim/vim.git
synced 2025-11-13 22:54:27 -05:00
patch 9.0.2068: [security] overflow in :history
Problem: [security] overflow in :history Solution: Check that value fits into int The get_list_range() function, used to parse numbers for the :history and :clist command internally uses long variables to store the numbers. However function arguments are integer pointers, which can then overflow. Check that the return value from the vim_str2nr() function is not larger than INT_MAX and if yes, bail out with an error. I guess nobody uses a cmdline/clist history that needs so many entries... (famous last words). It is only a moderate vulnerability, so impact should be low. Github Advisory: https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm Signed-off-by: Christian Brabandt <cb@256bit.org>
This commit is contained in:
@@ -3560,3 +3560,5 @@ EXTERN char e_xattr_e2big[]
|
||||
INIT(= N_("E1508: Size of the extended attribute value is larger than the maximum size allowed"));
|
||||
EXTERN char e_xattr_other[]
|
||||
INIT(= N_("E1509: Error occurred when reading or writing extended attribute"));
|
||||
EXTERN char e_val_too_large[]
|
||||
INIT(= N_("E1510: Value too large: %s"));
|
||||
|
||||
Reference in New Issue
Block a user