OESA-2025-1943

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1943
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1943.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1943
Upstream
Published
2025-08-01T13:03:39Z
Modified
2025-08-12T05:52:04.607407Z
Summary
vim security update
Details

Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor 'Vi', with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.

Security Fix(es):

Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim’s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.(CVE-2025-53905)

Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.(CVE-2025-53906)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:22.03-LTS-SP4 / vim

Package

Name
vim
Purl
pkg:rpm/openEuler/vim&distro=openEuler-22.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0-35.oe2203sp4

Ecosystem specific

{
    "aarch64": [
        "vim-X11-9.0-35.oe2203sp4.aarch64.rpm",
        "vim-common-9.0-35.oe2203sp4.aarch64.rpm",
        "vim-debuginfo-9.0-35.oe2203sp4.aarch64.rpm",
        "vim-debugsource-9.0-35.oe2203sp4.aarch64.rpm",
        "vim-enhanced-9.0-35.oe2203sp4.aarch64.rpm",
        "vim-minimal-9.0-35.oe2203sp4.aarch64.rpm"
    ],
    "x86_64": [
        "vim-X11-9.0-35.oe2203sp4.x86_64.rpm",
        "vim-common-9.0-35.oe2203sp4.x86_64.rpm",
        "vim-debuginfo-9.0-35.oe2203sp4.x86_64.rpm",
        "vim-debugsource-9.0-35.oe2203sp4.x86_64.rpm",
        "vim-enhanced-9.0-35.oe2203sp4.x86_64.rpm",
        "vim-minimal-9.0-35.oe2203sp4.x86_64.rpm"
    ],
    "src": [
        "vim-9.0-35.oe2203sp4.src.rpm"
    ],
    "noarch": [
        "vim-filesystem-9.0-35.oe2203sp4.noarch.rpm"
    ]
}