Debian Patches

Status for vim/2:9.0.1378-2+deb12u2

Patch Description Author Forwarded Bugs Origin Last update
debian/Support-sourcing-a-vimrc.tiny-when-Vim-is-invoked-as-vi.patch Support sourcing a vimrc.tiny when Vim is invoked as vi
This is used only in the vim-tiny package to allow a specific
configuration for vim-tiny's vi. The vim-tiny package is substantially
different from other Vim packages, so it does not make sense to
share the same config.
James McCoy <jamessan@debian.org> no 2015-10-06
debian/Detect-the-rst-filetype-using-the-contents-of-the-file.patch Detect the rst filetype using the contents of the file James Vega <jamessan@debian.org> no 2006-08-18
debian/Add-recognition-of-more-LaTeX-commands-for-tex-filetype-d.patch Add recognition of more LaTeX commands for tex filetype detection
Since filetype detection of TeX files defaults to plaintex, we've added
detection of some additional LaTeX commands to help sway the detection
to LaTeX.
Stefano Zacchiroli <zack@debian.org> no 2006-08-25
debian/Document-Debian-s-decision-to-disable-modelines-by-defaul.patch Document Debian's decision to disable modelines by default
Modelines have historically been a source of vulnerabilities in Vim.
As long as it remains a "blacklist suspected/proven dangerous options"
instead of a "whitelist allowed options" piece of functionality,
Debian's system-wide vimrc will maintain this setting. As such, the
documentation needs to be updated to reflect the induced behavior.
James Vega <jamessan@debian.org> no 2008-03-27
patch-9.0.1499-using-uninitialized-memory-with-fuzzy-matc.patch patch 9.0.1499: using uninitialized memory with fuzzy matching Bram Moolenaar <Bram@vim.org> no 2023-04-29
Fix-GH-267-where-indent-after-a-sub-would-not-work.patch Fix GH#267 where indent after a sub would not work Andy Lester <andy@petdance.com> no 2022-04-26
CVE-2023-2610.patch patch 9.0.1532: crash when expanding "~" in substitute causes very long text

(cherry picked from commit ab9a2d884b3a4abe319606ea95a5a6d6b01cd73a)
Bram Moolenaar <Bram@vim.org> no 2023-05-09
CVE-2023-4738.patch patch 9.0.1848: [security] buffer-overflow in vim_regsub_both()

(cherry picked from commit ced2c7394aafdc90fb7845e09b3a3fee23d48cb1)
Christian Brabandt <cb@256bit.org> no 2023-09-02
CVE-2023-4752.patch patch 9.0.1858: [security] heap use after free in ins_compl_get_exp()


(cherry picked from commit ee9166eb3b41846661a39b662dc7ebe8b5e15139)
Christian Brabandt <cb@256bit.org> no 2023-09-03
CVE-2023-4781.patch patch 9.0.1873: [security] heap-buffer-overflow in vim_regsub_both

(cherry picked from commit f6d28fe2c95c678cc3202cc5dc825a3fcc709e93)
Christian Brabandt <cb@256bit.org> no 2023-09-05
CVE-2023-5344.patch patch 9.0.1969: [security] buffer-overflow in trunc_string()

Currently trunc_string() assumes that when the string is too long,
buf[e-1] will always be writeable. But that assumption may not always be
true. The condition currently looks like this

else if (e + 3 < buflen)
[...]
else
{
// can't fit in the "...", just truncate it
buf[e - 1] = NUL;
}

but this means, we may run into the last else clause with e still being
larger than buflen. So a buffer overflow occurs.

So instead of using `buf[e - 1]`, let's just always
truncate at `buf[buflen - 1]` which should always be writable.

(cherry picked from commit 3bd7fa12e146c6051490d048a4acbfba974eeb04)
Christian Brabandt <cb@256bit.org> no 2023-10-02
CVE-2024-22667.patch patch 9.0.2142: [security]: stack-buffer-overflow in option callback functions

instead of sprintf()

We pass the error buffer down to the option callback functions, but in
some parts of the code, we simply use sprintf(buf) to write into the error
buffer, which can overflow.

So let's pass down the length of the error buffer and use sprintf(buf, size)
instead.

Reported by @henices, thanks!

(cherry picked from commit b39b240c386a5a29241415541f1c99e2e6b8ce47)
Christian Brabandt <cb@256bit.org> no 2023-11-29
CVE-2024-43802.patch patch 9.1.0697: [security]: heap-buffer-overflow in ins_typebuf
(SuyueGuo)
is enough space left

Github Advisory:
https://github.com/vim/vim/security/advisories/GHSA-4ghr-c62x-cqfh

(cherry picked from commit 322ba9108612bead5eb7731ccb66763dec69ef1b)
Christian Brabandt <cb@256bit.org> no 2024-08-25
CVE-2024-47814.patch patch 9.1.0764: [security]: use-after-free when closing a buffer
check whether the newly to be edited buffer has been marked
for deletion and abort in this case

Github Advisory:
https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg

(cherry picked from commit 51b62387be93c65fa56bbabe1c3c1ea5df187641)
Christian Brabandt <cb@256bit.org> no 2024-10-06

All known versions for source package 'vim'

Links