Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Zqvz2YXZFlji+ZJC@256bit.org>
Date: Thu, 1 Aug 2024 22:45:13 +0200
From: Christian Brabandt <cb@...bit.org>
To: oss-security@...ts.openwall.com
Subject: [vim-security] use-after-free in tagstack_clear_entry() in Vim <
 v9.1.0647


use-after-free in tagstack_clear_entry() in Vim 
===============================================
Date: 01.08.2024
Severity: Low
CVE: CVE-2024-41957
CWE: Double Free (CWE-415)

When closing a window, the corresponding tagstack data will be cleared
and freed. However a bit later, the quickfix list belonging to that
window will also be cleared and if that quickfix list points to the same
tagstack data, Vim will try to free it again, resulting in a
double-free/use-after-free access exception.

Impact is low since the user must intentionally execute vim with several non-default flags,
but it may cause a crash of Vim.

The Vim project would like to thank github user SuyueGuo for reporting this issue.

The issue has been fixed as of Vim patch v9.1.0647

URLs: https://github.com/vim/vim/commit/8a0bbe7b8aad6f8da28dee218c01bc8a
      https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4

Thanks,
Chris
-- 
Jedes Ding hat zwei Seiten. Fanatiker sehen nur die eine.
		-- Hellmut Walters

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.