Name | CVE-2019-12735 |
Description | getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1871-1, DSA-4467-1, DSA-4487-1, ELA-150-1 |
Debian Bugs | 930020, 930024 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
neovim (PTS) | stretch (security), stretch (lts), stretch | 0.1.7-4+deb9u1 | fixed |
buster | 0.3.4-3 | fixed | |
bullseye | 0.4.4-1 | fixed | |
bookworm | 0.7.2-7 | fixed | |
sid, trixie | 0.9.5-10 | fixed | |
vim (PTS) | jessie, jessie (lts) | 2:7.4.488-7+deb8u11 | fixed |
stretch (security) | 2:8.0.0197-4+deb9u7 | fixed | |
stretch (lts), stretch | 2:8.0.0197-4+deb9u11 | fixed | |
buster (security), buster, buster (lts) | 2:8.1.0875-5+deb10u6 | fixed | |
bullseye | 2:8.2.2434-3+deb11u1 | fixed | |
bookworm | 2:9.0.1378-2 | fixed | |
sid, trixie | 2:9.1.0861-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
neovim | source | stretch | 0.1.7-4+deb9u1 | DSA-4487-1 | ||
neovim | source | (unstable) | 0.3.4-3 | 930024 | ||
vim | source | wheezy | 7.3.547-7+deb7u5 | ELA-150-1 | ||
vim | source | jessie | 2:7.4.488-7+deb8u4 | DLA-1871-1 | ||
vim | source | stretch | 2:8.0.0197-4+deb9u2 | DSA-4467-1 | ||
vim | source | (unstable) | 2:8.1.0875-4 | 930020 |
https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-neovim.md
vim patches: https://github.com/vim/vim/commit/53575521406739cf20bbe4e384d88e7dca11f040
neovim pull request: https://github.com/neovim/neovim/pull/10082