Opened 3 weeks ago

Closed 3 weeks ago

#5877 closed enhancement (fixed)

vim-9.2.0078 (Security update)

Reported by: Bruce Dubbs Owned by: zeckma
Priority: high Milestone: 13.1
Component: Book Version: git
Severity: normal Keywords:
Cc:

Description

# Summary

An OS command injection vulnerability exists in the netrw standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using thescp:// protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process.

Change History (4)

comment:1 by Bruce Dubbs, 3 weeks ago

Fixed at commit 87c5aa4fed.

Leaving open for sa

comment:2 by zeckma, 3 weeks ago

Owner: changed from lfs-book to zeckma
Status: newassigned

Ensure that commit was pushed in LFS. I'll handle the SA.

comment:3 by zeckma, 3 weeks ago

Security fixes

Rating: Medium

  • CVE-2026-28417 (Medium): OS Command Injection in netrw
  • CVE-2026-28418 (Medium): Heap-based Buffer Overflow in Emacs tags parsing
  • CVE-2026-28419 (Medium): Heap-based Buffer Underflow in Emacs tags parsing
  • CVE-2026-28420 (Medium): Heap-based Buffer Overflow and OOB Read in :terminal
  • CVE-2026-28421 (Medium): Heap-based Buffer Overflow / Improper Input Validation
  • CVE-2026-28422 (Low): Stack-buffer-overflow in build_stl_str_hl()

comment:4 by zeckma, 3 weeks ago

Priority: normalhigh
Resolution: fixed
Status: assignedclosed

SA-12.4-108 issued.

Note: See TracTickets for help on using tickets.