Source: vim
Version: 2:9.1.0861-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 2:9.0.1378-2
Control: found -1 2:9.1.1113-1

Hi,

The following vulnerability was published for vim.

CVE-2025-27423[0]:
| Vim is an open source, command line text editor. Vim is distributed
| with the tar.vim plugin, that allows easy editing and viewing of
| (compressed or uncompressed) tar files. Starting with 9.1.0858, the
| tar.vim plugin uses the ":read" ex command line to append below the
| cursor position, however the is not sanitized and is taken literally
| from the tar archive. This allows to execute shell commands via
| special crafted tar archives. Whether this really happens, depends
| on the shell being used ('shell' option, which is set using $SHELL).
| The issue has been fixed as of Vim patch v9.1.1164


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-27423
    https://www.cve.org/CVERecord?id=CVE-2025-27423
[1] https://github.com/vim/vim/security/advisories/GHSA-wfmf-8626-q3r3
[2] https://github.com/vim/vim/commit/334a13bff78aa0ad206bc436885f63e3a0bab399

Regards,
Salvatore

Reply via email to