diff options
author | Mahmoud Al-Qudsi <mqudsi@neosmart.net> | 2022-10-17 21:15:24 -0500 |
---|---|---|
committer | GitHub <noreply@github.com> | 2022-10-18 10:15:24 +0800 |
commit | bd7ca10fdd762f8846dc0ef9db0a723bb8f3610a (patch) | |
tree | 116e9d58c727dfb7f898eea2365f0fb64d6bafff /runtime/lua/vim/shared.lua | |
parent | be43cf16cc677cf50f31cbbf75bc028ce36b8921 (diff) | |
download | rneovim-bd7ca10fdd762f8846dc0ef9db0a723bb8f3610a.tar.gz rneovim-bd7ca10fdd762f8846dc0ef9db0a723bb8f3610a.tar.bz2 rneovim-bd7ca10fdd762f8846dc0ef9db0a723bb8f3610a.zip |
fix(qflist): avoid read of uninitialized memory (#20709)
If the call to `qf_setup_state()` in `qf_init_ext()` fails, control flow jumps
to label `qf_init_end` where a call to `qf_update_buffer()` is made with
`old_last` as a function call argument.
Prior to this patch, `old_last` would not yet have been initialized to its
default value of `NULL`, resulting in `qf_update_buffer()` attempting to compare
against its uninitialized value (quickfix.c:3882) then later forwarding it to
`qf_fill_buffer()` where the address is dereferenced and repeatedly read from/
written to for performing core qflist operations.
Depending on what the default value of `old_last` was, the results may range
from a best case scenario of neovim terminating with SIGSEGV from an attempt to
dereference an invalid pointer (quickfix.c:4056) to memory corruption if it
contained some other value that results in `qfp` being initialized from
`old_last->qf_next` (after which it is subsequently written to and read from in
a fairly arbitrary fashion).
Though extremely unlikely, it's possible for there to be security considerations
as a user can ensure that the next call to `qf_setup_state()` fails.
This patch ensures that `old_last` is NULL-assigned before control flow jumps to
`qf_init_end`.
Closes #20639.
Diffstat (limited to 'runtime/lua/vim/shared.lua')
0 files changed, 0 insertions, 0 deletions