Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 937126 (CVE-2024-41957, CVE-2024-41965) - app-editors/vim: multiple vulnerabilities
Summary: app-editors/vim: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2024-41957, CVE-2024-41965
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://github.com/vim/vim/security/a...
Whiteboard: A3 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2024-08-02 13:40 UTC by Christopher Fore
Modified: 2024-08-02 13:42 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-08-02 13:40:39 UTC
CVE-2024-41957 (https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4):

When closing a window, the corresponding tagstack data will be cleared
and freed. However a bit later, the quickfix list belonging to that
window will also be cleared and if that quickfix list points to the same
tagstack data, Vim will try to free it again, resulting in a
double-free/use-after-free access exception.

Impact is low since the user must intentionally execute vim with several non-default flags, but it may cause a crash of Vim.


CVE-2024-41965 (https://github.com/vim/vim/security/advisories/GHSA-46pw-v7qw-xc2f):

When abandoning a buffer, Vim may ask the user what to do with the
modified buffer. If the user wants the changed buffer to be saved, Vim
may create a new Untitled file, if the buffer did not have a name yet.

However, when setting the buffer name to Unnamed, Vim will falsely free
a pointer twice, leading to a double-free and possibly later to a
heap-use-after-free, which can lead to a crash.



The above are both fixed in v9.1.0648.