|
Message-ID: <Zqvz2YXZFlji+ZJC@256bit.org> Date: Thu, 1 Aug 2024 22:45:13 +0200 From: Christian Brabandt <cb@...bit.org> To: oss-security@...ts.openwall.com Subject: [vim-security] use-after-free in tagstack_clear_entry() in Vim < v9.1.0647 use-after-free in tagstack_clear_entry() in Vim =============================================== Date: 01.08.2024 Severity: Low CVE: CVE-2024-41957 CWE: Double Free (CWE-415) When closing a window, the corresponding tagstack data will be cleared and freed. However a bit later, the quickfix list belonging to that window will also be cleared and if that quickfix list points to the same tagstack data, Vim will try to free it again, resulting in a double-free/use-after-free access exception. Impact is low since the user must intentionally execute vim with several non-default flags, but it may cause a crash of Vim. The Vim project would like to thank github user SuyueGuo for reporting this issue. The issue has been fixed as of Vim patch v9.1.0647 URLs: https://github.com/vim/vim/commit/8a0bbe7b8aad6f8da28dee218c01bc8a https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4 Thanks, Chris -- Jedes Ding hat zwei Seiten. Fanatiker sehen nur die eine. -- Hellmut Walters
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.