Dominique wrote:

> > afl-fuzz found the following command which causes a stack
> > buffer overflow in vim-7.4.2232 and older:
> >
> > $ vim  -c 'echo substitute("x", ".", {-> submatch(10)}, "")'
> >
> > This one as well:
> >
> > $ vim -u NONE -c 'norm ix' -c 's/./\=submatch(10)/'
> >
> > The address sanitizer reports:
> >
> > =================================================================
> > ==8302==ERROR: AddressSanitizer: stack-buffer-overflow on address
> > 0x7f65148036b0 at pc 0x77ec07 bp 0x7ffce56f5f00 sp 0x7ffce56f5ef8
> > READ of size 4 at 0x7f65148036b0 thread T0
> >     #0 0x77ec06 in reg_submatch /home/pel/sb/vim/src/regexp.c:7878
> >     #1 0x4e0043 in f_submatch /home/pel/sb/vim/src/evalfunc.c:11503
> >     #2 0x4afe03 in call_internal_func /home/pel/sb/vim/src/evalfunc.c:997
> >     #3 0x8e6e56 in call_func /home/pel/sb/vim/src/userfunc.c:1372
> >     #4 0x8e1948 in get_func_tv /home/pel/sb/vim/src/userfunc.c:455
> >     #5 0x493c4f in eval7 /home/pel/sb/vim/src/eval.c:4343
> >     #6 0x492837 in eval6 /home/pel/sb/vim/src/eval.c:3977
> >     #7 0x491dc7 in eval5 /home/pel/sb/vim/src/eval.c:3793
> >     #8 0x490623 in eval4 /home/pel/sb/vim/src/eval.c:3492
> >     #9 0x4901dc in eval3 /home/pel/sb/vim/src/eval.c:3409
> >     #10 0x48fdcd in eval2 /home/pel/sb/vim/src/eval.c:3341
> >     #11 0x48f945 in eval1 /home/pel/sb/vim/src/eval.c:3269
> >     #12 0x48f73c in eval0 /home/pel/sb/vim/src/eval.c:3229
> >     #13 0x482889 in eval_to_string /home/pel/sb/vim/src/eval.c:733
> >     #14 0x77cdce in vim_regsub_both /home/pel/sb/vim/src/regexp.c:7517
> >     #15 0x77c685 in vim_regsub_multi /home/pel/sb/vim/src/regexp.c:7390
> >     #16 0x4ff687 in do_sub /home/pel/sb/vim/src/ex_cmds.c:5496
> >     #17 0x5301e4 in do_one_cmd /home/pel/sb/vim/src/ex_docmd.c:2925
> >     #18 0x528514 in do_cmdline /home/pel/sb/vim/src/ex_docmd.c:1110
> >     #19 0x5270f8 in do_cmdline_cmd /home/pel/sb/vim/src/ex_docmd.c:715
> >     #20 0x985dc9 in exe_commands /home/pel/sb/vim/src/main.c:2896
> >     #21 0x97f1eb in vim_main2 /home/pel/sb/vim/src/main.c:781
> >     #22 0x97e7e6 in main /home/pel/sb/vim/src/main.c:415
> >     #23 0x7f65228ebf44 in __libc_start_main
> > (/lib/x86_64-linux-gnu/libc.so.6+0x21f44)
> >     #24 0x40eb28 (/home/pel/sb/vim/src/vim+0x40eb28)
> >
> > Address 0x7f65148036b0 is located in stack of thread T0 at offset 688 in 
> > frame
> >     #0 0x4fbf21 in do_sub /home/pel/sb/vim/src/ex_cmds.c:4775
> >
> >   This frame has 6 object(s):
> >     [32, 36) 'sc'
> >     [96, 100) 'ec'
> >     [160, 168) 'cmd'
> >     [224, 240) 'old_cursor'
> >     [288, 320) 'subflags_save'
> >     [352, 688) 'regmatch' <== Memory access at offset 688 overflows
> > this variable
> > HINT: this may be a false positive if your program uses some custom
> > stack unwind mechanism or swapcontext
> >       (longjmp and C++ exceptions *are* supported)
> > SUMMARY: AddressSanitizer: stack-buffer-overflow
> > /home/pel/sb/vim/src/regexp.c:7878 reg_submatch
> > Shadow bytes around the buggy address:
> >   0x0fed228f8680: f1 f1 f1 f1 04 f4 f4 f4 f2 f2 f2 f2 04 f4 f4 f4
> >   0x0fed228f8690: f2 f2 f2 f2 00 f4 f4 f4 f2 f2 f2 f2 00 00 f4 f4
> >   0x0fed228f86a0: f2 f2 f2 f2 00 00 00 00 f2 f2 f2 f2 00 00 00 00
> >   0x0fed228f86b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >   0x0fed228f86c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> > =>0x0fed228f86d0: 00 00 00 00 00 00[f4]f4 f3 f3 f3 f3 00 00 00 00
> >   0x0fed228f86e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >   0x0fed228f86f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >   0x0fed228f8700: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
> >   0x0fed228f8710: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
> >   0x0fed228f8720: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
> > Shadow byte legend (one shadow byte represents 8 application bytes):
> >   Addressable:           00
> >   Partially addressable: 01 02 03 04 05 06 07
> >   Heap left redzone:       fa
> >   Heap right redzone:      fb
> >   Freed heap region:       fd
> >   Stack left redzone:      f1
> >   Stack mid redzone:       f2
> >   Stack right redzone:     f3
> >   Stack partial redzone:   f4
> >   Stack after return:      f5
> >   Stack use after scope:   f8
> >   Global redzone:          f9
> >   Global init order:       f6
> >   Poisoned by user:        f7
> >   Contiguous container OOB:fc
> >   ASan internal:           fe
> > ==8302==ABORTING
> >
> > Valgrind detects the bug as well but indirectly as use
> > of uninitialized memory, since valgrind does not check
> > for buffer overflows in stack.
> >
> > Attached patch fixes it and adds a test.
> >
> > Regards
> > Dominique
> 
> Attached is a small update to the patch: comment in test
> indicated "Vim-7.3.2232" instead of "Vim-7.4.2232".

Thanks.  Must have been there for a long time.

-- 
Light travels faster than sound.  This is why some people
appear bright until you hear them speak

 /// Bram Moolenaar -- [email protected] -- http://www.Moolenaar.net   \\\
///        sponsor Vim, vote for features -- http://www.Vim.org/sponsor/ \\\
\\\  an exciting new programming language -- http://www.Zimbu.org        ///
 \\\            help me help AIDS victims -- http://ICCF-Holland.org    ///

-- 
-- 
You received this message from the "vim_dev" maillist.
Do not top-post! Type your reply below the text you are replying to.
For more information, visit http://www.vim.org/maillist.php

--- 
You received this message because you are subscribed to the Google Groups 
"vim_dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Raspunde prin e-mail lui