Bug 1717942

Summary: vim/neovim: arbitrary code execution vulnerability
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aron, asn, gchamoul, igor.raits, karsten, michel, zdohnal
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-13 07:53:36 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1717503, 1717949, 1717950, 1717951    
Bug Blocks: 1717944    

Description Dhananjay Arunesh 2019-06-06 13:54:49 UTC
Arbitrary code execution vulnerability in Vim < 8.1.1365 and Neovim < 0.3.6
via modelines. Also, why you should not use Vim with default config, or
cat without -v.
 
Reference:
https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-neovim.md
https://twitter.com/rawsec/status/1135895908594409472/photo/1

Comment 1 Dhananjay Arunesh 2019-06-06 14:07:25 UTC
Created neovim tracking bugs for this issue:

Affects: fedora-all [bug 1717950]


Created vim tracking bugs for this issue:

Affects: fedora-all [bug 1717949]

Comment 2 Dhananjay Arunesh 2019-06-06 14:08:01 UTC
Created neovim tracking bugs for this issue:

Affects: epel-7 [bug 1717951]

Comment 3 Dhananjay Arunesh 2019-06-13 07:53:36 UTC

*** This bug has been marked as a duplicate of bug 1718308 ***