import vim-8.0.1763-19.el8_6.2
This commit is contained in:
parent
eedc06f3b5
commit
329a0f6996
@ -0,0 +1,54 @@
|
|||||||
|
diff -up vim80/src/globals.h.cve1621 vim80/src/globals.h
|
||||||
|
--- vim80/src/globals.h.cve1621 2022-05-24 12:46:44.883952323 +0200
|
||||||
|
+++ vim80/src/globals.h 2022-05-24 12:47:30.534183523 +0200
|
||||||
|
@@ -1657,6 +1657,11 @@ EXTERN int *eval_lavars_used INIT(= NULL
|
||||||
|
EXTERN int ctrl_break_was_pressed INIT(= FALSE);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
+#ifdef FEAT_SPELL
|
||||||
|
+EXTERN char e_illegal_character_in_word[]
|
||||||
|
+ INIT(= N_("E1280: Illegal character in word"));
|
||||||
|
+#endif
|
||||||
|
+
|
||||||
|
/*
|
||||||
|
* Optional Farsi support. Include it here, so EXTERN and INIT are defined.
|
||||||
|
*/
|
||||||
|
diff -up vim80/src/mbyte.c.cve1621 vim80/src/mbyte.c
|
||||||
|
--- vim80/src/mbyte.c.cve1621 2018-04-09 14:55:56.000000000 +0200
|
||||||
|
+++ vim80/src/mbyte.c 2022-05-24 12:22:13.166893098 +0200
|
||||||
|
@@ -4034,7 +4034,7 @@ theend:
|
||||||
|
convert_setup(&vimconv, NULL, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
-#if defined(FEAT_GUI_GTK) || defined(PROTO)
|
||||||
|
+#if defined(FEAT_GUI_GTK) || defined(FEAT_SPELL) || defined(PROTO)
|
||||||
|
/*
|
||||||
|
* Return TRUE if string "s" is a valid utf-8 string.
|
||||||
|
* When "end" is NULL stop at the first NUL.
|
||||||
|
diff -up vim80/src/spellfile.c.cve1621 vim80/src/spellfile.c
|
||||||
|
--- vim80/src/spellfile.c.cve1621 2022-05-24 12:22:13.167893104 +0200
|
||||||
|
+++ vim80/src/spellfile.c 2022-05-24 12:49:55.816919350 +0200
|
||||||
|
@@ -4441,6 +4441,10 @@ store_word(
|
||||||
|
int res = OK;
|
||||||
|
char_u *p;
|
||||||
|
|
||||||
|
+ // Avoid adding illegal bytes to the word tree.
|
||||||
|
+ if (enc_utf8 && !utf_valid_string(word, NULL))
|
||||||
|
+ return FAIL;
|
||||||
|
+
|
||||||
|
(void)spell_casefold(word, len, foldword, MAXWLEN);
|
||||||
|
for (p = pfxlist; res == OK; ++p)
|
||||||
|
{
|
||||||
|
@@ -6251,6 +6255,12 @@ spell_add_word(
|
||||||
|
int i;
|
||||||
|
char_u *spf;
|
||||||
|
|
||||||
|
+ if (enc_utf8 && !utf_valid_string(word, NULL))
|
||||||
|
+ {
|
||||||
|
+ emsg(_(e_illegal_character_in_word));
|
||||||
|
+ return;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
if (idx == 0) /* use internal wordlist */
|
||||||
|
{
|
||||||
|
if (int_wordlist == NULL)
|
@ -0,0 +1,15 @@
|
|||||||
|
diff -up vim80/src/search.c.cve1629 vim80/src/search.c
|
||||||
|
--- vim80/src/search.c.cve1629 2022-05-24 13:55:06.789859865 +0200
|
||||||
|
+++ vim80/src/search.c 2022-05-24 13:56:31.889218958 +0200
|
||||||
|
@@ -4349,7 +4349,11 @@ find_next_quote(
|
||||||
|
if (c == NUL)
|
||||||
|
return -1;
|
||||||
|
else if (escape != NULL && vim_strchr(escape, c))
|
||||||
|
+ {
|
||||||
|
++col;
|
||||||
|
+ if (line[col] == NUL)
|
||||||
|
+ return -1;
|
||||||
|
+ }
|
||||||
|
else if (c == quotechar)
|
||||||
|
break;
|
||||||
|
#ifdef FEAT_MBYTE
|
@ -24,7 +24,7 @@ Summary: The VIM editor
|
|||||||
URL: http://www.vim.org/
|
URL: http://www.vim.org/
|
||||||
Name: vim
|
Name: vim
|
||||||
Version: %{baseversion}.%{patchlevel}
|
Version: %{baseversion}.%{patchlevel}
|
||||||
Release: 16%{?dist}.13
|
Release: 19%{?dist}.2
|
||||||
License: Vim and MIT
|
License: Vim and MIT
|
||||||
Source0: ftp://ftp.vim.org/pub/vim/unix/vim-%{baseversion}-%{patchlevel}.tar.bz2
|
Source0: ftp://ftp.vim.org/pub/vim/unix/vim-%{baseversion}-%{patchlevel}.tar.bz2
|
||||||
Source1: vim.sh
|
Source1: vim.sh
|
||||||
@ -75,9 +75,9 @@ Patch3019: 0001-patch-8.1.1365-source-command-doesn-t-check-for-the-.patch
|
|||||||
Patch3020: vim-crypto-warning.patch
|
Patch3020: vim-crypto-warning.patch
|
||||||
# 1842755 - CVE-2019-20807
|
# 1842755 - CVE-2019-20807
|
||||||
Patch3021: 0001-patch-8.1.0881-can-execute-shell-commands-in-rvim-th.patch
|
Patch3021: 0001-patch-8.1.0881-can-execute-shell-commands-in-rvim-th.patch
|
||||||
# 2004974 - CVE-2021-3796 vim: use-after-free in nv_replace() in normal.c [rhel-8.5.0]
|
# 2004975 - CVE-2021-3796 vim: use-after-free in nv_replace() in normal.c [rhel-8.6.0]
|
||||||
Patch3022: vim-cve3796.patch
|
Patch3022: vim-cve3796.patch
|
||||||
# 2004891 - CVE-2021-3778 vim: heap-based buffer overflow in utf_ptr2char() in mbyte.c [rhel-8.5.0]
|
# 2004892 - CVE-2021-3778 vim: heap-based buffer overflow in utf_ptr2char() in mbyte.c [rhel-8.6.0]
|
||||||
Patch3023: vim-cve3778-fix.patch
|
Patch3023: vim-cve3778-fix.patch
|
||||||
Patch3024: 0001-patch-8.2.3487-illegal-memory-access-if-buffer-name-.patch
|
Patch3024: 0001-patch-8.2.3487-illegal-memory-access-if-buffer-name-.patch
|
||||||
# 2028341 - CVE-2021-3984 vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow [rhel-8.6.0]
|
# 2028341 - CVE-2021-3984 vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow [rhel-8.6.0]
|
||||||
@ -102,6 +102,10 @@ Patch3033: 0001-patch-8.2.4253-using-freed-memory-when-substitute-wi.patch
|
|||||||
Patch3034: 0001-patch-8.2.4215-illegal-memory-access-when-copying-li.patch
|
Patch3034: 0001-patch-8.2.4215-illegal-memory-access-when-copying-li.patch
|
||||||
# CVE-2022-1154 vim: use after free in utf_ptr2char
|
# CVE-2022-1154 vim: use after free in utf_ptr2char
|
||||||
Patch3035: 0001-patch-8.2.4646-using-buffer-line-after-it-has-been-f.patch
|
Patch3035: 0001-patch-8.2.4646-using-buffer-line-after-it-has-been-f.patch
|
||||||
|
# CVE-2022-1621 vim: heap buffer overflow
|
||||||
|
Patch3036: 0001-patch-8.2.4919-can-add-invalid-bytes-with-spellgood.patch
|
||||||
|
# CVE-2022-1629 vim: buffer over-read
|
||||||
|
Patch3037: 0001-patch-8.2.4925-trailing-backslash-may-cause-reading-.patch
|
||||||
|
|
||||||
# gcc is no longer in buildroot by default
|
# gcc is no longer in buildroot by default
|
||||||
BuildRequires: gcc
|
BuildRequires: gcc
|
||||||
@ -314,6 +318,8 @@ perl -pi -e "s,bin/nawk,bin/awk,g" runtime/tools/mve.awk
|
|||||||
%patch3033 -p1 -b .cve0413
|
%patch3033 -p1 -b .cve0413
|
||||||
%patch3034 -p1 -b .cve0361
|
%patch3034 -p1 -b .cve0361
|
||||||
%patch3035 -p1 -b .cve1154
|
%patch3035 -p1 -b .cve1154
|
||||||
|
%patch3036 -p1 -b .cve1621
|
||||||
|
%patch3037 -p1 -b .cve1629
|
||||||
|
|
||||||
%build
|
%build
|
||||||
%if 0%{?rhel} > 7
|
%if 0%{?rhel} > 7
|
||||||
@ -832,57 +838,42 @@ touch %{buildroot}/%{_datadir}/%{name}/vimfiles/doc/tags
|
|||||||
%{_datadir}/icons/locolor/*/apps/*
|
%{_datadir}/icons/locolor/*/apps/*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Sat Apr 09 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16.13
|
* Wed May 25 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-19.2
|
||||||
|
- CVE-2022-1621 vim: heap buffer overflow
|
||||||
|
- CVE-2022-1629 vim: buffer over-read
|
||||||
|
|
||||||
|
* Sat Apr 09 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-19.1
|
||||||
- CVE-2022-1154 vim: use after free in utf_ptr2char
|
- CVE-2022-1154 vim: use after free in utf_ptr2char
|
||||||
|
|
||||||
* Tue Feb 08 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16.12
|
* Tue Feb 08 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-19
|
||||||
- CVE-2022-0361 vim: Heap-based Buffer Overflow in GitHub repository
|
- CVE-2022-0361 vim: Heap-based Buffer Overflow in GitHub repository
|
||||||
|
|
||||||
* Fri Feb 04 2022 Tomas Korbar <tkorbar@redhat.com> - 2:8.0.1763-16.11
|
* Mon Feb 07 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-18
|
||||||
- CVE-2022-0413 vim: use after free in src/ex_cmds.c
|
|
||||||
- Fix specfile problems
|
|
||||||
- Resolves: rhbz#2048525
|
|
||||||
|
|
||||||
* Thu Feb 03 2022 Tomas Korbar <tkorbar@redhat.com> - 2:8.0.1763-16.10
|
|
||||||
- CVE-2022-0413 vim: use after free in src/ex_cmds.c
|
|
||||||
- Resolves: rhbz#2048525
|
|
||||||
|
|
||||||
* Wed Feb 02 2022 Tomas Korbar <tkorbar@redhat.com> - 2:8.0.1763-16.9
|
|
||||||
- CVE-2022-0392 vim: heap-based buffer overflow in getexmodeline() in ex_getln.c
|
- CVE-2022-0392 vim: heap-based buffer overflow in getexmodeline() in ex_getln.c
|
||||||
- Improve fix
|
- CVE-2022-0413 vim: use after free in src/ex_cmds.c
|
||||||
- Resolves: rhbz#2049403
|
|
||||||
|
|
||||||
* Wed Feb 02 2022 Tomas Korbar <tkorbar@redhat.com> - 2:8.0.1763-16.8
|
* Thu Jan 27 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-18
|
||||||
- CVE-2022-0392 vim: heap-based buffer overflow in getexmodeline() in ex_getln.c
|
- fix test suite after fix for CVE-2022-0318
|
||||||
- Resolves: rhbz#2049403
|
|
||||||
|
|
||||||
* Thu Jan 27 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16.7
|
|
||||||
- CVE-2022-0359 vim: heap-based buffer overflow in init_ccline() in ex_getln.c
|
- CVE-2022-0359 vim: heap-based buffer overflow in init_ccline() in ex_getln.c
|
||||||
|
|
||||||
* Thu Jan 27 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16.6
|
* Wed Jan 12 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-18
|
||||||
- fix test suite after fix for CVE-2022-0318
|
|
||||||
|
|
||||||
* Wed Jan 26 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16.5
|
|
||||||
- CVE-2022-0261 vim: Heap-based Buffer Overflow in block_insert() in src/ops.c
|
- CVE-2022-0261 vim: Heap-based Buffer Overflow in block_insert() in src/ops.c
|
||||||
- CVE-2022-0318 vim: heap-based buffer overflow in utf_head_off() in mbyte.c
|
- CVE-2022-0318 vim: heap-based buffer overflow in utf_head_off() in mbyte.c
|
||||||
|
|
||||||
* Wed Jan 12 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16.4
|
* Wed Jan 12 2022 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-18
|
||||||
- CVE-2021-4193 vim: vulnerable to Out-of-bounds Read
|
- CVE-2021-4193 vim: vulnerable to Out-of-bounds Read
|
||||||
- CVE-2021-4192 vim: vulnerable to Use After Free
|
- CVE-2021-4192 vim: vulnerable to Use After Free
|
||||||
|
|
||||||
* Fri Dec 03 2021 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16.3
|
* Fri Dec 03 2021 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-18
|
||||||
- 2028341 - CVE-2021-3984 vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow [rhel-8.6.0]
|
- 2028341 - CVE-2021-3984 vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow [rhel-8.6.0]
|
||||||
- 2028430 - CVE-2021-4019 vim: heap-based buffer overflow in find_help_tags() in src/help.c [rhel-8.6.0]
|
- 2028430 - CVE-2021-4019 vim: heap-based buffer overflow in find_help_tags() in src/help.c [rhel-8.6.0]
|
||||||
|
|
||||||
* Tue Oct 26 2021 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16.2
|
* Tue Oct 26 2021 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-17
|
||||||
- remove the upstream test - uses a feature which is not presented in RHEL 8
|
- 2016201 - CVE-2021-3872 vim: heap-based buffer overflow in win_redr_status() drawscreen.c [rhel-8.6.0]
|
||||||
|
|
||||||
* Tue Oct 26 2021 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16.1
|
* Thu Sep 23 2021 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16
|
||||||
- CVE-2021-3872 vim: heap-based buffer overflow in win_redr_status() drawscreen.c [rhel-8.6.0]
|
- 2004975 - CVE-2021-3796 vim: use-after-free in nv_replace() in normal.c [rhel-8.6.0]
|
||||||
|
- 2004892 - CVE-2021-3778 vim: heap-based buffer overflow in utf_ptr2char() in mbyte.c [rhel-8.6.0]
|
||||||
* Mon Sep 20 2021 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-16
|
|
||||||
- 2004974 - CVE-2021-3796 vim: use-after-free in nv_replace() in normal.c [rhel-8.5.0]
|
|
||||||
- 2004891 - CVE-2021-3778 vim: heap-based buffer overflow in utf_ptr2char() in mbyte.c [rhel-8.5.0]
|
|
||||||
|
|
||||||
* Tue Jun 02 2020 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-15
|
* Tue Jun 02 2020 Zdenek Dohnal <zdohnal@redhat.com> - 2:8.0.1763-15
|
||||||
- 1842755 - CVE-2019-20807
|
- 1842755 - CVE-2019-20807
|
||||||
|
Loading…
Reference in New Issue
Block a user