登录
注册
开源
企业版
高校版
搜索
帮助中心
使用条款
关于我们
开源
企业版
高校版
私有云
模力方舟
登录
注册
代码拉取完成,页面将自动刷新
捐赠
捐赠前请先登录
取消
前往登录
扫描微信二维码支付
取消
支付完成
支付提示
将跳转至支付宝完成支付
确定
取消
Watch
不关注
关注所有动态
仅关注版本发行动态
关注但不提醒动态
8
Star
0
Fork
31
src-anolis-os
/
vim
代码
Issues
0
Pull Requests
2
Wiki
统计
流水线
服务
JavaDoc
PHPDoc
质量分析
Jenkins for Gitee
腾讯云托管
腾讯云 Serverless
悬镜安全
阿里云 SAE
Codeblitz
SBOM
我知道了,不再自动展开
32
New patchlevel 9.0.2116
已合并
src-anolis-os:a23
src-anolis-os:a23
Funda Wang
创建于 2023-11-21 21:56
克隆/下载
HTTPS
SSH
复制
下载 Email Patch
下载 Diff 文件
- https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765 (CVE-2023-48231) When closing a window, vim may try to access already freed window structure. So before trying to access any window related variable verify that the window to be closed is still valid and if not, return. Impact is low, since it is not very easy to make use of this and execute some payload (in particular not, without the user noticing). - https://github.com/vim/vim/security/advisories/GHSA-f6cx-x634-hqpw (CVE-2023-48232) A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Impact is rather low, since we do not expect many users to have those non-default setting set. - https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj (CVE-2023-48233) If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen. - https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq (CVE-2023-48234) When getting the count for a normal mode z command, it may overflow for large counts given. So let's verify that the result can be safely stored, else abort the z command. Impact is low, user interaction is required and a crash may not even happen. - https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g (CVE-2023-48235) When parsing relative ex addresses one may unintentionally cause an overflow. Ironacially this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen. So verify that the line numer is actually positive before doing the actual overflow check. - https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5 (CVE-2023-48236) When using the z= command, we may overflow the count with values larger than MAX_INT. So verify that we do not overflow and in case when an overflow is detected, simply return 0 Impact is low, user interaction is required and a crash may not even happen. - https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87 (CVE-2023-48237) When shifting lines in operator pending mode and using a very large value, we may overflow the size of integer. Fix this by using a long long variable, testing if the result would be larger than INT_MAX and if so, indent by INT_MAX value. Impact is low, user interaction is required and a crash may not even happen. - https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q (CVE-2023-48706) When executing a :s command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive :s call causes free-ing of memory which may later then be accessed by the initial :s comamnd. Impact is low since the user must intentionally execute the payload and the whole process is a bit tricky to do (since it seems to work only reliably for the very first :s command). It may also cause a crash of Vim.
此 Pull Request 需要通过一些审核项
类型
指派人员
状态
审查
happy_orange
已审查通过
已完成
(1/0人)
测试
小龙
已测试通过
已完成
(1/1人)
怎样手动合并此 Pull Request
git checkout a23
git pull https://gitee.com/src-anolis-os/vim.git a23
git push origin a23
评论
6
提交
1
文件
2
检查
代码问题
0
批量操作
展开设置
折叠设置
审查
Code Owner
审查人员
gongwen2021
gongwen2021
happy_orange
happy_orange
geliwei
geliwei
casparant
casparant
ZhouWeitao
yunqi-zwt
jiangbo.jacob
jiangbojacob
forrest_ly
forrest_ly
Meredith
yueeranna
未设置
最少人数
0
测试
gongwen2021
gongwen2021
happy_orange
happy_orange
geliwei
geliwei
casparant
casparant
ZhouWeitao
yunqi-zwt
jiangbo.jacob
jiangbojacob
forrest_ly
forrest_ly
Meredith
yueeranna
小龙
anolis-bot
未设置
最少人数
1
优先级
不指定
严重
主要
次要
不重要
标签
cve
anolis_cla_pass
anolis_test_pass
CVE/Low
关联 Issue
未关联
Pull Request 合并后将关闭上述关联 Issue
里程碑
未关联里程碑
参与者
(3)
1
https://gitee.com/src-anolis-os/vim.git
git@gitee.com:src-anolis-os/vim.git
src-anolis-os
vim
vim
点此查找更多帮助
搜索帮助
Git 命令在线学习
如何在 Gitee 导入 GitHub 仓库
Git 仓库基础操作
企业版和社区版功能对比
SSH 公钥设置
如何处理代码冲突
仓库体积过大,如何减小?
如何找回被删除的仓库数据
Gitee 产品配额说明
GitHub仓库快速导入Gitee及同步更新
什么是 Release(发行版)
将 PHP 项目自动发布到 packagist.org
评论
仓库举报
回到顶部
登录提示
该操作需登录 Gitee 帐号,请先登录后再操作。
立即登录
没有帐号,去注册