Hi
afl-fuzz found the following command which causes a stack
buffer overflow in vim-7.4.2232 and older:
$ vim -c 'echo substitute("x", ".", {-> submatch(10)}, "")'
This one as well:
$ vim -u NONE -c 'norm ix' -c 's/./\=submatch(10)/'
The address sanitizer reports:
=================================================================
==8302==ERROR: AddressSanitizer: stack-buffer-overflow on address
0x7f65148036b0 at pc 0x77ec07 bp 0x7ffce56f5f00 sp 0x7ffce56f5ef8
READ of size 4 at 0x7f65148036b0 thread T0
#0 0x77ec06 in reg_submatch /home/pel/sb/vim/src/regexp.c:7878
#1 0x4e0043 in f_submatch /home/pel/sb/vim/src/evalfunc.c:11503
#2 0x4afe03 in call_internal_func /home/pel/sb/vim/src/evalfunc.c:997
#3 0x8e6e56 in call_func /home/pel/sb/vim/src/userfunc.c:1372
#4 0x8e1948 in get_func_tv /home/pel/sb/vim/src/userfunc.c:455
#5 0x493c4f in eval7 /home/pel/sb/vim/src/eval.c:4343
#6 0x492837 in eval6 /home/pel/sb/vim/src/eval.c:3977
#7 0x491dc7 in eval5 /home/pel/sb/vim/src/eval.c:3793
#8 0x490623 in eval4 /home/pel/sb/vim/src/eval.c:3492
#9 0x4901dc in eval3 /home/pel/sb/vim/src/eval.c:3409
#10 0x48fdcd in eval2 /home/pel/sb/vim/src/eval.c:3341
#11 0x48f945 in eval1 /home/pel/sb/vim/src/eval.c:3269
#12 0x48f73c in eval0 /home/pel/sb/vim/src/eval.c:3229
#13 0x482889 in eval_to_string /home/pel/sb/vim/src/eval.c:733
#14 0x77cdce in vim_regsub_both /home/pel/sb/vim/src/regexp.c:7517
#15 0x77c685 in vim_regsub_multi /home/pel/sb/vim/src/regexp.c:7390
#16 0x4ff687 in do_sub /home/pel/sb/vim/src/ex_cmds.c:5496
#17 0x5301e4 in do_one_cmd /home/pel/sb/vim/src/ex_docmd.c:2925
#18 0x528514 in do_cmdline /home/pel/sb/vim/src/ex_docmd.c:1110
#19 0x5270f8 in do_cmdline_cmd /home/pel/sb/vim/src/ex_docmd.c:715
#20 0x985dc9 in exe_commands /home/pel/sb/vim/src/main.c:2896
#21 0x97f1eb in vim_main2 /home/pel/sb/vim/src/main.c:781
#22 0x97e7e6 in main /home/pel/sb/vim/src/main.c:415
#23 0x7f65228ebf44 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x21f44)
#24 0x40eb28 (/home/pel/sb/vim/src/vim+0x40eb28)
Address 0x7f65148036b0 is located in stack of thread T0 at offset 688 in frame
#0 0x4fbf21 in do_sub /home/pel/sb/vim/src/ex_cmds.c:4775
This frame has 6 object(s):
[32, 36) 'sc'
[96, 100) 'ec'
[160, 168) 'cmd'
[224, 240) 'old_cursor'
[288, 320) 'subflags_save'
[352, 688) 'regmatch' <== Memory access at offset 688 overflows
this variable
HINT: this may be a false positive if your program uses some custom
stack unwind mechanism or swapcontext
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow
/home/pel/sb/vim/src/regexp.c:7878 reg_submatch
Shadow bytes around the buggy address:
0x0fed228f8680: f1 f1 f1 f1 04 f4 f4 f4 f2 f2 f2 f2 04 f4 f4 f4
0x0fed228f8690: f2 f2 f2 f2 00 f4 f4 f4 f2 f2 f2 f2 00 00 f4 f4
0x0fed228f86a0: f2 f2 f2 f2 00 00 00 00 f2 f2 f2 f2 00 00 00 00
0x0fed228f86b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fed228f86c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0fed228f86d0: 00 00 00 00 00 00[f4]f4 f3 f3 f3 f3 00 00 00 00
0x0fed228f86e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fed228f86f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fed228f8700: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
0x0fed228f8710: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
0x0fed228f8720: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Contiguous container OOB:fc
ASan internal: fe
==8302==ABORTING
Valgrind detects the bug as well but indirectly as use
of uninitialized memory, since valgrind does not check
for buffer overflows in stack.
Attached patch fixes it and adds a test.
Regards
Dominique
--
--
You received this message from the "vim_dev" maillist.
Do not top-post! Type your reply below the text you are replying to.
For more information, visit http://www.vim.org/maillist.php
---
You received this message because you are subscribed to the Google Groups
"vim_dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.
diff --git a/src/evalfunc.c b/src/evalfunc.c
index 16e2365..504f344 100644
--- a/src/evalfunc.c
+++ b/src/evalfunc.c
@@ -11491,7 +11491,11 @@ f_submatch(typval_T *argvars, typval_T *rettv)
no = (int)get_tv_number_chk(&argvars[0], &error);
if (error)
return;
- error = FALSE;
+ if (no < 0 || no >= NSUBEXP)
+ {
+ EMSGN(_("E999: invalid submatch number %d"), no);
+ return;
+ }
if (argvars[1].v_type != VAR_UNKNOWN)
retList = (int)get_tv_number_chk(&argvars[1], &error);
if (error)
@@ -12326,7 +12330,7 @@ get_callback(typval_T *arg, partial_T **pp)
}
/*
- * Unref/free "callback" and "partial" retured by get_callback().
+ * Unref/free "callback" and "partial" returned by get_callback().
*/
void
free_callback(char_u *callback, partial_T *partial)
diff --git a/src/testdir/test_expr.vim b/src/testdir/test_expr.vim
index a7ad65e..ce32cc1 100644
--- a/src/testdir/test_expr.vim
+++ b/src/testdir/test_expr.vim
@@ -198,6 +198,11 @@ func Test_substitute_expr()
call assert_equal('--', substitute('xxx', 'x*', {-> '-' . Recurse() . '-'}, ''))
endfunc
+func Test_invalid_submatch()
+ " This was causing invalid memory access in Vim-7.3.2232 and older
+ call assert_fails("call substitute('x', '.', {-> submatch(10)}, '')", 'E999:')
+endfunc
+
func Test_substitute_expr_arg()
call assert_equal('123456789-123456789=', substitute('123456789',
\ '\(.\)\(.\)\(.\)\(.\)\(.\)\(.\)\(.\)\(.\)\(.\)',