diff --git a/SOURCES/0001-patch-8.1.1365-source-command-doesn-t-check-for-the-.patch b/SOURCES/0001-patch-8.1.1365-source-command-doesn-t-check-for-the-.patch new file mode 100644 index 0000000..97e8e2e --- /dev/null +++ b/SOURCES/0001-patch-8.1.1365-source-command-doesn-t-check-for-the-.patch @@ -0,0 +1,16 @@ +diff -up vim80/src/getchar.c.cve vim80/src/getchar.c +--- vim80/src/getchar.c.cve 2019-06-14 13:46:17.269523985 +0200 ++++ vim80/src/getchar.c 2019-06-14 13:46:58.427169288 +0200 +@@ -1418,6 +1418,12 @@ openscript( + EMSG(_(e_nesting)); + return; + } ++ ++ // Disallow sourcing a file in the sandbox, the commands would be executed ++ // later, possibly outside of the sandbox. ++ if (check_secure()) ++ return; ++ + #ifdef FEAT_EVAL + if (ignore_script) + /* Not reading from script, also don't open one. Warning message? */ diff --git a/SPECS/vim.spec b/SPECS/vim.spec index 10beea8..263ec80 100644 --- a/SPECS/vim.spec +++ b/SPECS/vim.spec @@ -20,7 +20,7 @@ Summary: The VIM editor URL: http://www.vim.org/ Name: vim Version: %{baseversion}.%{patchlevel} -Release: 5%{?dist} +Release: 6%{?dist} License: Vim Group: Applications/Editors Source0: ftp://ftp.vim.org/pub/vim/unix/vim-%{baseversion}.tar.bz2 @@ -226,6 +226,8 @@ Patch3016: vim-7.4-yamlsyntax.patch Patch3017: vim-7.4-c++11.patch # 1319760 - [RFE] Vim should support blowfish2, plus ensure that RHEL6 encrypted files can be opened in RHEL7 Patch3018: vim-7.4-blowfish2.patch +# 1719963 - CVE-2019-12735 source command allows arbitrary command execution via the modeline +Patch3019: 0001-patch-8.1.1365-source-command-doesn-t-check-for-the-.patch Buildroot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) BuildRequires: python-devel ncurses-devel gettext perl-devel @@ -543,6 +545,7 @@ perl -pi -e "s,bin/nawk,bin/awk,g" runtime/tools/mve.awk %patch3016 -p1 %patch3017 -p1 %patch3018 -p1 +%patch3019 -p1 %build cp -f %{SOURCE5} . @@ -1027,6 +1030,9 @@ rm -rf %{buildroot} %{_datadir}/icons/hicolor/*/apps/* %changelog +* Fri Jun 14 2019 Zdenek Dohnal - 2:7.4.160-6 +- 1719963 - CVE-2019-12735 source command allows arbitrary command execution via the modeline + * Mon Jun 18 2018 Zdenek Dohnal - 2:7.4.160-5 - 1490927 - vim dumps core when system reboots