-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEwZbe96kJeWh2OITRdyg1Qz0oXX0FAlz/9uIACgkQdyg1Qz0o
XX3X8hAAsQrj3DKT6yGLqKR/cDlqxDXvaWMVXqzTgPVGMWl+Fpq7+xRa6Lydx3Ye
oMxT34l1dXuBRiHCqeLfhPVXHzgr/zRp5Lhhrk+HQDYum4bqtjw0veoJW8TELUxR
vsRHdHLhAfHk/Rf9EQuofjlMf1tzY9jiAy04xo1evIm4HgbrgXo083l5g1gxZzKW
+kBUzahAPaIY9/ylGQCWEEdxkZ2te+VGuRNK0XiklVX057rmZDLoEgLFJIMUdg6h
UWXoyybsSHChphASgDyoxDS5vkbUe29aVc6ucx0+T2270AOFW7wg8+gazwt9CyuL
qyPkbheZrwg0FGUGVhGIEQOBKxqq6uF3m+47X7++7PV3oRwyH9fWussJylddaiJl
JKFaZCUZcW38zgTihJ4A6QM/oJZSYX0Uyqd1VPP1sq2hvTH58PlebdbNJE7OFeAW
V8AtAhct1fsZqjNNbERfCm3TljXm4YesjxvhnkjyxUyzJ1v4OR+zhY6EXFx3S5sZ
KCVpp8YMZTsW0FldT/ke3VOIuNooriBb+2DtZtU2WlPvjrb0OQCxQz/lDw4C2xYk
0OZN2+712dEGNBeAQO3ZwLylAAFKzDKs2BylPUFfziHxfvBrWN607pxYTVv7qPWm
zb8qyTPqdLz0K6W/YwT5d7A+cFojj07w+3yiNDPS5TUK271NuKw=
=QVFa
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4016-2
June 11, 2019
Neovim vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
Summary:
Neovim could be made to run programs as your login if it
opened a specially crafted file.
Software Description:
- neovim: heavily refactored vim fork
Details:
It was discovered that Neovim incorrectly handled certain files. An attacker
could possibly use this issue to execute arbitrary code. (CVE-2019-12735)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
neovim 0.3.4-1ubuntu0.19.04.1
neovim-runtime 0.3.4-1ubuntu0.19.04.1
Ubuntu 18.10:
neovim 0.3.1-1ubuntu0.1
neovim-runtime 0.3.1-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4016-2
https://usn.ubuntu.com/4016-1
CVE-2019-12735
Package Information:
https://launchpad.net/ubuntu/+source/neovim/0.3.4-1ubuntu0.19.04.1
https://launchpad.net/ubuntu/+source/neovim/0.3.1-1ubuntu0.1
No comments:
Post a Comment