Hi James,

On Thu, Jun 06, 2019 at 09:29:14PM -0400, James McCoy wrote:
> Control: found -1 0.3.4-2
> 
> On Wed, Jun 05, 2019 at 03:33:23PM +0200, Salvatore Bonaccorso wrote:
> > Control: retitle neovim: CVE-2019-12735: Modelines allow arbitrary code 
> > execution
> > 
> > On Wed, Jun 05, 2019 at 03:14:43AM -0700, Matthew Crews wrote:
> > > Source: neovim
> > > Severity: important
> > > Tags: upstream
> > > 
> > > Dear Maintainer,
> > > 
> > > Neovim versions < 0.3.6 are subject to an Arbitrary Code Execution 
> > > exploit via
> > > modelines, as described in this blogpost:
> > > 
> > > https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-
> > > neovim.md
> > > 
> > > Upgrading the Neovim package to >= 0.3.6 fixes this exploit.
> > 
> > MITRE assigned CVE-2019-12735 for this issue.
> 
> This isn't actually fixed in upstream's 0.3.6, as it's missing a few
> prerequisite patches.  They were merged to neovim's master branch, but
> not the release branch.
> 
> The simple test that was part of Vim's patch for this problem was
> blocked, but not a slightly more involved scenario.
> 
> Working with upstream to get that fixed and will update the Debian
> package as well.

Ack! Thanks for the status update.

Rgards,
Salvatore

Reply via email to