From 623ee73d661e5ed8475cb264511f683407d87365 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Sun, 12 Apr 2020 03:41:30 +0100 Subject: gentoo Easter resync : 12.04.2020 --- metadata/glsa/glsa-202003-04.xml | 65 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 65 insertions(+) create mode 100644 metadata/glsa/glsa-202003-04.xml (limited to 'metadata/glsa/glsa-202003-04.xml') diff --git a/metadata/glsa/glsa-202003-04.xml b/metadata/glsa/glsa-202003-04.xml new file mode 100644 index 000000000000..c822e21abf22 --- /dev/null +++ b/metadata/glsa/glsa-202003-04.xml @@ -0,0 +1,65 @@ + + + + Vim, gVim: Remote execution of arbitrary code + A vulnerability has been found in Vim and gVim concerning how + certain modeline options are treated. + + vim,gvim + 2020-03-12 + 2020-03-12 + 687394 + local, remote + + + 8.1.1486 + 8.1.1486 + + + 8.1.1486 + 8.1.1486 + + + +

Vim is an efficient, highly configurable improved version of the classic + ‘vi’ text editor. gVim is the GUI version of Vim. +

+
+ +

+ It was found that the :source! command was not restricted by + the sandbox mode. If modeline was explicitly enabled, opening a specially + crafted text file in vim could result in arbitrary command execution. +

+
+ +

A remote attacker could entice a user to open a specially crafted file + using Vim or gVim, possibly resulting in execution of arbitrary code with + the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Vim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/vim-8.1.1486" + + +

All gVim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/gvim-8.1.1486" + + +
+ + CVE-2019-12735 + + whissi + whissi +
-- cgit v1.2.3