{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for neovim","title":"Title of the patch"},{"category":"description","text":"This update for neovim fixes the following issues:\n\nneovim was updated to version 0.3.7:\n\n* CVE-2019-12735: source should check sandbox (boo#1137443)\n* genappimage.sh: migrate to linuxdeploy\n\nVersion Update to version 0.3.5:\n\n* options: properly reset directories on 'autochdir'\n* Remove MSVC optimization workaround for SHM_ALL\n* Make SHM_ALL to a variable instead of a compound literal #define\n* doc: mention 'pynvim' module rename\n* screen: don't crash when drawing popupmenu with 'rightleft' option\n* look-behind match may use the wrong line number\n* :terminal : set topline based on window height\n* :recover : Fix crash on non-existent *.swp\n\nVersion Update to version 0.3.4:\n\n* test: add tests for conceal cursor movement\n* display: unify ursorline and concealcursor redraw logic\n\nVersion Update to version 0.3.3:\n\n* health/provider: Check for available pynvim when neovim mod is missing\n* python#CheckForModule: Use the given module string instead of hard-coding pynvim\n* (health.provider)/python: Import the neovim, rather than pynvim, module\n* TUI: Konsole DECSCUSR fixup\n\nVersion Update to version 0.3.2:- \n\n* Features\n\n  - clipboard: support Custom VimL functions (#9304)\n  - win/TUI: improve terminal/console support (#9401)\n  - startup: Use $XDG_CONFIG_DIRS/nvim/sysinit.vim if exists (#9077)\n  - support mapping in more places (#9299)\n  - diff/highlight: show underline for low-priority CursorLine (#9028)\n  - signs: Add 'nuhml' argument (#9113)\n  - clipboard: support Wayland (#9230)\n  - TUI: add support for undercurl and underline color (#9052)\n  - man.vim: soft (dynamic) wrap (#9023)\n\n* API\n\n  - API: implement object namespaces (#6920)\n  - API: implement nvim_win_set_buf() (#9100)\n  - API: virtual text annotations (nvim_buf_set_virtual_text) (#8180)\n  - API: add nvim_buf_is_loaded() (#8660)\n  - API: nvm_buf_get_offset_for_line (#8221)\n  - API/UI: ext_newgrid, ext_histate (#8221)\n\n* UI\n\n  - TUI: use BCE again more often (smoother resize) (#8806)\n  - screen: add missing status redraw when redraw_later(CLEAR) was used (#9315)\n  - TUI: clip invalid regions on resize (#8779)\n  - TUI: improvements for scrolling and clearing (#9193)\n  - TUI: disable clearing almost everywhere (#9143)\n  - TUI: always use safe cursor movement after resize (#9079)\n  - ui_options: also send when starting or from OptionSet (#9211)\n  - TUI: Avoid reset_color_cursor_color in old VTE (#9191)\n  - Don't erase screen on :hi Normal during startup (#9021)\n  - TUI: Hint wrapped lines to terminals (#8915) \n\n* FIXES\n\n  - RPC: turn errors from async calls into notifications\n  - TUI: Restore terminal title via 'title stacking' (#9407)\n  - genappimage: Unset $ARGV0 at invocation (#9376)\n  - TUI: Konsole 18.07.70 supports DECSCUSR (#9364)\n  - provider: improve error message (#9344) \n  - runtime/syntax: Fix highlighting of autogroup contents (#9328)\n  - VimL/confirm(): Show dialog even if :silent (#9297)\n  - clipboard: prefer xclip (#9302)\n  - provider/nodejs: fix npm, yarn detection\n  - channel: avoid buffering output when only terminal is active (#9218)\n  - ruby: detect rbenv shims for other versions (#8733)\n  - third party/unibilium: Fix parsing of extended capabilitiy entries (#9123)\n  - jobstart(): Fix hang on non-executable cwd (#9204)\n  - provide/nodejs: Simultaneously query npm and yarn (#9054)\n  - undo: Fix infinite loop if undo_read_byte returns EOF (#2880) \n  - 'swapfile: always show dialog' (#9034) \n\n- Add to the system-wide configuration file extension of runtimepath by\n  /usr/share/vim/site, so that neovim uses other Vim plugins installed\n  from packages.\n\n- Add /usr/share/vim/site tree of directories to be owned by neovim as\n  well.\n\nThis update was imported from the openSUSE:Leap:15.0:Update update project.","title":"Description of the patch"},{"category":"details","text":"openSUSE-2019-1796","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1796-1.json"},{"category":"self","summary":"URL for openSUSE-SU-2019:1796-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6RJXM33RFU6CEU4RJBJ7IIU6ZU4ZYVM/#Q6RJXM33RFU6CEU4RJBJ7IIU6ZU4ZYVM"},{"category":"self","summary":"E-Mail link for openSUSE-SU-2019:1796-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6RJXM33RFU6CEU4RJBJ7IIU6ZU4ZYVM/#Q6RJXM33RFU6CEU4RJBJ7IIU6ZU4ZYVM"},{"category":"self","summary":"SUSE Bug 1137443","url":"https://bugzilla.suse.com/1137443"},{"category":"self","summary":"SUSE CVE CVE-2019-12735 page","url":"https://www.suse.com/security/cve/CVE-2019-12735/"}],"title":"Security update for neovim","tracking":{"current_release_date":"2019-07-23T11:26:42Z","generator":{"date":"2019-07-23T11:26:42Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2019:1796-1","initial_release_date":"2019-07-23T11:26:42Z","revision_history":[{"date":"2019-07-23T11:26:42Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"neovim-lang-0.3.7-bp150.2.9.1.noarch","product":{"name":"neovim-lang-0.3.7-bp150.2.9.1.noarch","product_id":"neovim-lang-0.3.7-bp150.2.9.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"neovim-0.3.7-bp150.2.9.1.x86_64","product":{"name":"neovim-0.3.7-bp150.2.9.1.x86_64","product_id":"neovim-0.3.7-bp150.2.9.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Package Hub 15","product":{"name":"SUSE Package Hub 15","product_id":"SUSE Package Hub 15"}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"neovim-0.3.7-bp150.2.9.1.x86_64 as component of SUSE Package Hub 15","product_id":"SUSE Package Hub 15:neovim-0.3.7-bp150.2.9.1.x86_64"},"product_reference":"neovim-0.3.7-bp150.2.9.1.x86_64","relates_to_product_reference":"SUSE Package Hub 15"},{"category":"default_component_of","full_product_name":{"name":"neovim-lang-0.3.7-bp150.2.9.1.noarch as component of SUSE Package Hub 15","product_id":"SUSE Package Hub 15:neovim-lang-0.3.7-bp150.2.9.1.noarch"},"product_reference":"neovim-lang-0.3.7-bp150.2.9.1.noarch","relates_to_product_reference":"SUSE Package Hub 15"}]},"vulnerabilities":[{"cve":"CVE-2019-12735","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-12735"}],"notes":[{"category":"general","text":"getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15:neovim-0.3.7-bp150.2.9.1.x86_64","SUSE Package Hub 15:neovim-lang-0.3.7-bp150.2.9.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-12735","url":"https://www.suse.com/security/cve/CVE-2019-12735"},{"category":"external","summary":"SUSE Bug 1137443 for CVE-2019-12735","url":"https://bugzilla.suse.com/1137443"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15:neovim-0.3.7-bp150.2.9.1.x86_64","SUSE Package Hub 15:neovim-lang-0.3.7-bp150.2.9.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.0"},"products":["SUSE Package Hub 15:neovim-0.3.7-bp150.2.9.1.x86_64","SUSE Package Hub 15:neovim-lang-0.3.7-bp150.2.9.1.noarch"]}],"threats":[{"category":"impact","date":"2019-07-23T11:26:42Z","details":"moderate"}],"title":"CVE-2019-12735"}]}