Control: retitle vim: CVE-2019-12735: Modelines allow arbitrary code execution

On Wed, Jun 05, 2019 at 11:55:49AM +0200, Kyle Robbertze wrote:
> Source: vim
> Severity: important
> Tags: security, patch
> 
> Dear Maintainer,
> 
> Vim currently allows arbitrary code execution in modelines outside of 
> the sandboxed environment when using ':source!' in the modeline. 
> Details can be found here [1] and upstream's patch here [2].
> 
> [1] 
> https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-neovim.md
> 
> [2] https://github.com/vim/vim/commit/5357552

MITRE assigned CVE-2019-12735 for this issue.

Regards,
Salvatore

Reply via email to