Debian Security Advisory DSA-4467-1 email@example.com https://www.debian.org/security/ Moritz Muehlenhoff June 18, 2019 https://www.debian.org/security/faq
Package : vim CVE ID : CVE-2019-12735
User "Arminius" discovered a vulnerability in Vim, an enhanced version of the standard UNIX editor Vi (Vi IMproved). The "Common vulnerabilities and exposures project" identifies the following problem:
Editors typically provide a way to embed editor configuration commands (aka modelines) which are executed once a file is opened, while harmful commands are filtered by a sandbox mechanism. It was discovered that the "source" command (used to include and execute another file) was not filtered, allowing shell command execution with a carefully crafted file opened in Vim.
For the stable distribution (stretch), this problem has been fixed in version 8.0.0197-4+deb9u2.
We recommend that you upgrade your vim packages.
For the detailed security status of vim please refer to its security tracker page at: https://security-tracker.debian.org/tracker/vim
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: firstname.lastname@example.org