Skip to content
Snippets Groups Projects
Select Git revision
  • main default
  • 2025Q1
  • 2024Q1
  • 2024Q4
  • 2024Q3
  • 2024Q2
  • 2023Q4
  • 2023Q3
  • 2023Q2
  • 2023Q1
  • 2022Q4
  • 2022Q3
  • 2022Q2
  • 2022Q1
  • 2021Q4
  • 2021Q3
  • 2021Q2
  • 2021Q1
  • 2020Q4
  • 2020Q3
  • release/13.5.0
  • 13.3-eol
  • release/14.2.0
  • 14.0-eol
  • release/13.4.0
  • release/14.1.0
  • release/13.3.0
  • 12-eol
  • 12.4-eol
  • release/14.0.0
  • 13.1-eol-q
  • 13.1-eol
  • 12.3-last
  • 12.3-eol
  • release/13.2.0
  • release/12.4.0
  • release/13.1.0
  • release/12.3.0
  • 11-eol
  • release/13.0.0
40 results

distinfo

  • Adam Weinberger's avatar
    c7aeeb09
    editors/vim: Update to 9.1.1164 (security, high severity) · c7aeeb09
    Adam Weinberger authored
    From the Github Advisory (https://github.com/vim/vim/security/advisories/GHSA-wfmf-8626-q3r3):
      Summary:
    
          Potential code execution with tar.vim and special crafted tar
          files.
    
      Description:
    
          Vim is distributed with the tar.vim plugin, that allows easy
          editing and viewing of (compressed or uncompressed) tar files.
    
          Since commit 129a844 (Nov 11, 2024 runtime(tar): Update tar.vim to
          support permissions), the tar.vim plugin uses the ":read " ex
          command line to append below the cursor position, however the is
          not sanitized and is taken literaly from the tar archive. This
          allows to execute shell commands via special crafted tar archives.
          Whether this really happens, depends on the shell being used
          ('shell' option, which is set using $SHELL).
    
      Impact:
    
          Impact is high but a user must be convinced to edit such a file
          using Vim which will reveal the filename, so a careful user may
          suspect some strange things going on.
    
      The Vim project would like to thank RyotaK (GMO Flatt Security Inc)
      for reporting this issue.
    
      The issue has been fixed as of Vim patch v9.1.1164.
    
    MFH:		2025Q1
    Security:	GHSA-wfmf-8626-q3r3
    c7aeeb09
    History
    editors/vim: Update to 9.1.1164 (security, high severity)
    Adam Weinberger authored
    From the Github Advisory (https://github.com/vim/vim/security/advisories/GHSA-wfmf-8626-q3r3):
      Summary:
    
          Potential code execution with tar.vim and special crafted tar
          files.
    
      Description:
    
          Vim is distributed with the tar.vim plugin, that allows easy
          editing and viewing of (compressed or uncompressed) tar files.
    
          Since commit 129a844 (Nov 11, 2024 runtime(tar): Update tar.vim to
          support permissions), the tar.vim plugin uses the ":read " ex
          command line to append below the cursor position, however the is
          not sanitized and is taken literaly from the tar archive. This
          allows to execute shell commands via special crafted tar archives.
          Whether this really happens, depends on the shell being used
          ('shell' option, which is set using $SHELL).
    
      Impact:
    
          Impact is high but a user must be convinced to edit such a file
          using Vim which will reveal the filename, so a careful user may
          suspect some strange things going on.
    
      The Vim project would like to thank RyotaK (GMO Flatt Security Inc)
      for reporting this issue.
    
      The issue has been fixed as of Vim patch v9.1.1164.
    
    MFH:		2025Q1
    Security:	GHSA-wfmf-8626-q3r3
Code owners
Assign users and groups as approvers for specific file changes. Learn more.
distinfo 175 B
TIMESTAMP = 1740973693
SHA256 (vim-vim-v9.1.1166_GH0.tar.gz) = 18543682cffe511407ef6a61af6df842d60232fad58c7c02544ae5860107e6be
SIZE (vim-vim-v9.1.1166_GH0.tar.gz) = 18510701