Change logs for vim source package in Mantic

  • vim (2:9.0.1672-1ubuntu2.4) mantic; urgency=medium
    
      * Ensure Ubuntu codenames are current (LP: #2064687).
    
     -- Simon Quigley <email address hidden>  Thu, 02 May 2024 21:44:37 -0500
  • vim (2:9.0.1672-1ubuntu2.3) mantic-security; urgency=medium
    
      * SECURITY UPDATE: stack based buffer overflow
        - debian/patches/CVE-2024-22667.patch: passes error buffer length down
          through option callback functions.
        - CVE-2024-22667
    
     -- Ian Constantin <email address hidden>  Thu, 14 Mar 2024 15:39:48 +0200
  • vim (2:9.0.1672-1ubuntu2.2) mantic-security; urgency=medium
    
      * SECURITY UPDATE: use-after-free vulnerability
        - debian/patches/CVE-2023-46246.patch: Check that the return value from the
          vim_str2nr() function is not larger than INT_MAX and if yes, bail out with
          an error.
        - CVE-2023-46246
      * SECURITY UPDATE: use-after-free vulnerability
        - debian/patches/CVE-2023-48231.patch: If the current window structure is
          no longer valid, fail and return before attempting to set win->w_closing
          variable.
        - CVE-2023-48231
      * SECURITY UPDATE: division by zero
        - debian/patches/CVE-2023-48232-*.patch: Prevent a floating point exception
          when calculating w_skipcol (which can happen with a small window when the
          number option is set and cpo+=n).
        - CVE-2023-48232
      * SECURITY UPDATE: integer overflow
        - debian/patches/CVE-2023-48233.patch: If the count after the :s command is
          larger than what fits into a (signed) long variable, abort with
          e_value_too_large.
        - CVE-2023-48233
      * SECURITY UPDATE: integer overflow
        - debian/patches/CVE-2023-48234.patch: When getting the count for a normal z
          command, it may overflow for large counts given. So verify, that we can
          safely store the result in a long.
        - CVE-2023-48234
      * SECURITY UPDATE: integer overflow
        - debian/patches/CVE-2023-48235.patch: When parsing relative ex addresses
          one may unintentionally cause an overflow (because LONG_MAX - lnum will
          overflow for negative addresses).
        - CVE-2023-48235
      * SECURITY UPDATE: integer overflow
        - debian/patches/CVE-2023-48236.patch: When using the z= command, we may
          overflow the count with values larger than MAX_INT. So verify that we do
          not overflow and in case when an overflow is detected, simply return 0.
        - CVE-2023-48236
      * SECURITY UPDATE: integer overflow
        - debian/patches/CVE-2023-48237.patch: When shifting lines in operator
          pending mode and using a very large value, we may overflow the size of
          integer. Fix this by using a long variable, testing if the result would
          be larger than INT_MAX and if so, indent by INT_MAX value.
        - CVE-2023-48237
      * SECURITY UPDATE: use-after-free vulnerability
        - debian/patches/CVE-2023-48706.patch: ensure that the sub var always using
          allocated memory.
        - CVE-2023-48706
    
     -- Fabian Toepfer <email address hidden>  Mon, 04 Dec 2023 13:42:16 +0100
  • vim (2:9.0.1672-1ubuntu2.1) mantic-security; urgency=medium
    
      * SECURITY UPDATE: use-after-free vulnerability
        - debian/patches/CVE-2023-4733.patch: Verify oldwin pointer after
          reset_VIsual() in do_ecmd.
        - CVE-2023-4733
      * SECURITY UPDATE: integer overflow vulnerability
        - debian/patches/CVE-2023-4734.patch: Check for typeval correctly in
          f_fullcommand.
        - CVE-2023-4734
      * SECURITY UPDATE: out of bounds write vulnerability
        - debian/patches/CVE-2023-4735.patch: Add check for buffer size to avoid
          overflow in do_addsub.
        - CVE-2023-4735
      * SECURITY UPDATE: buffer overflow vulnerability
        - debian/patches/CVE-2023-4738.patch: Check remaining space in
          vim_regsub_both.
        - CVE-2023-4738
      * SECURITY UPDATE: use-after-free vulnerability
        - debian/patches/CVE-2023-4750.patch: Check buffer is valid before
          accessing it.
        - CVE-2023-4750
      * SECURITY UPDATE: use-after-free vulnerability
        - debian/patches/CVE-2023-4752.patch: validate buffer before accessing it
          in ins_compl_get_exp.
        - CVE-2023-4752
      * SECURITY UPDATE: heap based buffer overflow vulnerability
        - debian/patches/CVE-2023-4781.patch: Disallow exchanging windows when
          textlock is active in vim_regsub_both.
        - CVE-2023-4781
      * SECURITY UPDATE: heap based buffer overflow vulnerability
        - debian/patches/CVE-2023-5344.patch: Add NULL at end of buffer in
          trunc_string.
        - CVE-2023-5344
      * SECURITY UPDATE: NULL pointer dereference
        - debian/patches/CVE-2023-5441.patch: skip gui_scroll when exmode_active
          in gui_do_scroll.
        - CVE-2023-5441
      * SECURITY UPDATE: use-after-free vulnerability
        - debian/patches/CVE-2023-5535.patch: block autocommands in
          buf_contents_changed.
        - CVE-2023-5535
    
     -- Fabian Toepfer <email address hidden>  Mon, 16 Oct 2023 20:21:01 +0200
  • vim (2:9.0.1672-1ubuntu2) mantic; urgency=medium
    
      * debian/patches/0002-disable-failing-tests-on-ppc64.patch (LP: #2033072)
        - Skip few more tests failing on ppc64el due to sodium_mlock().
          Some of them also failed on arm64 and armd64 during tests with a PPA, so
          skip them on those archs as well.
    
     -- Danilo Egea Gondolfo <email address hidden>  Fri, 25 Aug 2023 13:17:49 +0100
  • vim (2:9.0.1672-1ubuntu1) mantic; urgency=low
    
      * Merge from Debian unstable. Remaining changes:
        - debian/runtime/vimrc:
          + "syntax on" is a sane default for non-tiny Vim.
        - debian/patches/debian/ubuntu-grub-syntax.patch:
          + Add Ubuntu-specific "quiet" keyword.
        - debian/patches/ubuntu-mouse-off.patch:
         + Mouse mode is actively harmful in some chroots.
        - debian/patches/patches/increase_timeout.diff:
          + Increase timeout for the Test_pattern_compile_speed patch.
        - debian/patches/0001-fix-flaky-terminal-mode-test.vim:
          + Fix flaky Vim terminal mode test.
        - debian/patches/0002-disable-failing-tests-on-ppc64.patch:
          + Disable some tests that were throwing an ENOMEM during build on
            ppc64el. The tests are only disabled when building on ppc64el.
    
    vim (2:9.0.1672-1) unstable; urgency=medium
    
      * Merge upstream patch v9.0.1672
      * Remove check for DEB_BUILD_OPTIONS=nocheck, since dh_auto_test handles it now
      * Skip Test_uncrypt_xchacha20 tests on big endian systems
    
    vim (2:9.0.1658-1) unstable; urgency=medium
    
      * Merge upstream patch v9.0.1658
        + Vulnerability fixes
          - 9.0.1392: Using NULL pointer with nested :open command, CVE-2023-1264
          - 9.0.1402: Crash when using null_class, CVE-2023-1355
          - 9.0.1531: Crash when register contents ends up being invalid,
            CVE-2023-2609
          - 9.0.1532: Crash when expanding "~" in substitute causes very long
            text, (Closes: #1035955, CVE-2023-2610)
        + 9.0.1409: Racket files are recognized as their own filetype, rather than
          as scheme
        + 9.0.1619: Always recognize the codes for focus gained/lost, even if Vim
          doesn't expect the terminal to support them.  (Closes: #1038401)
        + Document behavior of C-x / C-a on numbers outside the range of a 64-bit
          value.  (Closes: #1031256)
      * Refresh patches, dropping backport of v9.0.1499
      * Include uganda.txt, sponsor.txt, and versionX.txt in vim-common so the
        intro screen has functional help links when only vim-tiny and vim-common
        are installed
      * Declare compliance with Policy 4.6.2, no changes needed
      * Remove non-functional diversion handling in vim-runtime.postinst
    
     -- Julian Andres Klode <email address hidden>  Tue, 25 Jul 2023 13:58:43 +0200
  • vim (2:9.0.1658-1ubuntu1) mantic; urgency=low
    
      * Merge from Debian unstable. Remaining changes:
        - debian/runtime/vimrc:
          + "syntax on" is a sane default for non-tiny Vim.
        - debian/patches/debian/ubuntu-grub-syntax.patch:
          + Add Ubuntu-specific "quiet" keyword.
        - debian/patches/ubuntu-mouse-off.patch:
         + Mouse mode is actively harmful in some chroots.
        - debian/patches/patches/increase_timeout.diff:
          + Increase timeout for the Test_pattern_compile_speed patch.
        - debian/patches/0001-fix-flaky-terminal-mode-test.vim:
          + Fix flaky Vim terminal mode test.
        - debian/patches/0002-disable-failing-tests-on-ppc64.patch:
          + Disable some tests that were throwing an ENOMEM during build on
            ppc64el. The tests are only disabled when building on ppc64el.
      * Dropped changes:
        - Remove the CVE patches, included upstream
    
    vim (2:9.0.1658-1) unstable; urgency=medium
    
      * Merge upstream patch v9.0.1658
        + Vulnerability fixes
          - 9.0.1392: Using NULL pointer with nested :open command, CVE-2023-1264
          - 9.0.1402: Crash when using null_class, CVE-2023-1355
          - 9.0.1531: Crash when register contents ends up being invalid,
            CVE-2023-2609
          - 9.0.1532: Crash when expanding "~" in substitute causes very long
            text, (Closes: #1035955, CVE-2023-2610)
        + 9.0.1409: Racket files are recognized as their own filetype, rather than
          as scheme
        + 9.0.1619: Always recognize the codes for focus gained/lost, even if Vim
          doesn't expect the terminal to support them.  (Closes: #1038401)
        + Document behavior of C-x / C-a on numbers outside the range of a 64-bit
          value.  (Closes: #1031256)
      * Refresh patches, dropping backport of v9.0.1499
      * Include uganda.txt, sponsor.txt, and versionX.txt in vim-common so the
        intro screen has functional help links when only vim-tiny and vim-common
        are installed
      * Declare compliance with Policy 4.6.2, no changes needed
      * Remove non-functional diversion handling in vim-runtime.postinst
    
     -- Julian Andres Klode <email address hidden>  Mon, 03 Jul 2023 16:21:02 +0200
  • vim (2:9.0.1378-2ubuntu2) mantic; urgency=medium
    
      * SECURITY UPDATE: NULL pointer dereference when processing register content
        - debian/patches/CVE-2023-2609.patch: check "y_array" is not NULL.
        - CVE-2023-2609
      * SECURITY UPDATE: integer overflow and excessive memory consumption when
        allocating memory for tilde processing in pattern
        - debian/patches/CVE-2023-2610.patch: limit the text length to MAXCOL.
        - CVE-2023-2610
    
     -- Camila Camargo de Matos <email address hidden>  Wed, 24 May 2023 11:10:23 -0300
  • vim (2:9.0.1378-2ubuntu1) mantic; urgency=medium
    
      * Merge from Debian Unstable. Remaining changes:
        - debian/runtime/vimrc:
          + "syntax on" is a sane default for non-tiny Vim.
        - debian/patches/debian/ubuntu-grub-syntax.patch:
          + Add Ubuntu-specific "quiet" keyword.
        - debian/patches/ubuntu-mouse-off.patch:
         + Mouse mode is actively harmful in some chroots.
        - debian/patches/patches/increase_timeout.diff:
          + Increase timeout for the Test_pattern_compile_speed patch.
        - debian/patches/0001-fix-flaky-terminal-mode-test.vim:
          + Fix flaky Vim terminal mode test.
        - debian/patches/0002-disable-failing-tests-on-ppc64.patch:
          + Disable some tests that were throwing an ENOMEM during build on
            ppc64el. The tests are only disabled when building on ppc64el.
        - SECURITY UPDATE: NULL pointer dereference vulnerability
          + debian/patches/CVE-2023-1264.patch: using NULL pointer with nested
            :open command
          + CVE-2023-1264
        - SECURITY UPDATE: NULL pointer dereference vulnerability
          + debian/patches/CVE-2023-1355.patch
          + CVE-2023-1355
      * Welcome to the Mantic Minotaur!
    
    vim (2:9.0.1378-2) unstable; urgency=medium
    
      * Backport 9.0.1499 to fix CVE-2023-2426 (Closes: #1035323)
      * Backport fix for indenting of Perl subroutines (Closes: #1034529)
    
     -- Simon Quigley <email address hidden>  Wed, 10 May 2023 11:28:16 -0500
  • vim (2:9.0.1378-1ubuntu1) mantic; urgency=medium
    
      * Merge from Debian Unstable. Remaining changes:
        - debian/runtime/vimrc:
          + "syntax on" is a sane default for non-tiny Vim.
        - debian/patches/debian/ubuntu-grub-syntax.patch:
          + Add Ubuntu-specific "quiet" keyword.
        - debian/patches/ubuntu-mouse-off.patch:
         + Mouse mode is actively harmful in some chroots.
        - debian/patches/patches/increase_timeout.diff:
          + Increase timeout for the Test_pattern_compile_speed patch.
        - debian/patches/0001-fix-flaky-terminal-mode-test.vim:
          + Fix flaky Vim terminal mode test.
        - debian/patches/0002-disable-failing-tests-on-ppc64.patch:
          + Disable some tests that were throwing an ENOMEM during build on
            ppc64el. The tests are only disabled when building on ppc64el.
        - SECURITY UPDATE: NULL pointer dereference vulnerability
          + debian/patches/CVE-2023-1264.patch: using NULL pointer with nested
            :open command
          + CVE-2023-1264
      * SECURITY UPDATE: NULL pointer dereference vulnerability
        - debian/patches/CVE-2023-1355.patch
        - CVE-2023-1355
    
    vim (2:9.0.1378-1) unstable; urgency=medium
    
      * Merge upstream patch v9.0.1378
        + Vulnerability fixes
          - 9.0.1143: Invalid memory access with bad 'statusline' value,
            CVE-2023-0049
          - 9.0.1144: Reading beyond text, CVE-2023-0051
          - 9.0.1145: Invalid memory access with recursive substitute expression,
            (Closes: #1031875, CVE-2023-0054)
          - 9.0.1189: Invalid memory access with folding and using "L",
            CVE-2023-0288
          - 9.0.1225: Reading past the end of a line when formatting text,
            CVE-2023-0433
          - 9.0.1247: Divide by zero with 'smoothscroll' set and a narrow window,
            CVE-2023-0512
          - 9.0.1367: Divide by zero in zero-width window, CVE-2023-1127
          - 9.0.1376: Accessing invalid memory with put in Visual block mode,
            CVE-2023-1170
        + 9.0.1073, 9.0.1080: Fix keyboard input/mapping support for some
          terminals (e.g., foot and kitty).  (Closes: #1029049)
        + 9.0.1213: Fix inconsistent behavior when adding text after a fold at the
          end of the buffer (Closes: #868252)
        + syntax/2html.vim: Fix reference to undefined s:settings_no_doc variable
          (Closes: #1030151)
        + syntax/debcontrol.vim, syntax/debsources.vim: Add support for
          non-free-firmware.  (Closes: #1029986)
    
     -- Simon Quigley <email address hidden>  Wed, 26 Apr 2023 16:25:45 -0500
  • vim (2:9.0.1000-4ubuntu3) lunar; urgency=medium
    
      * Security upload for the devel series (LP: #2013211)
      * SECURITY UPDATE: reading past the end of a line when formatting text
        - debian/patches/CVE-2023-0433.patch: check for not going over the end of
          the line.
        - CVE-2023-0433
      * SECURITY UPDATE: divide by zero issue
        - debian/patches/CVE-2023-0512.patch: divide by zero with 'smoothscroll'
          set and a narrow window
        - debian/patches/CVE-2023-1127.patch: divide by zero in zero-width window
        - CVE-2023-0512
        - CVE-2023-1127
      * SECURITY UPDATE: heap based buffer overflow vulnerability
        - debian/patches/CVE-2023-1170.patch: accessing invalid memory with put
          in Visual block mode
        - CVE-2023-1170
      * SECURITY UPDATE: incorrect calculation of buffer size
        - debian/patches/CVE-2023-1175.patch: illegal memory access when using
          virtual editing
        - CVE-2023-1175
      * SECURITY UPDATE: NULL pointer dereference vulnerability
        - debian/patches/CVE-2023-1264.patch: using NULL pointer with nested
          :open command
        - CVE-2023-1264
    
     -- Nishit Majithia <email address hidden>  Wed, 29 Mar 2023 18:19:19 +0530