vulnerability
Amazon Linux 2023: CVE-2025-29768: Medium priority package update for vim
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:L/AC:M/Au:N/C:P/I:P/A:N) | Mar 13, 2025 | Apr 15, 2025 | Jul 17, 2025 |
Severity
3
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:N)
Published
Mar 13, 2025
Added
Apr 15, 2025
Modified
Jul 17, 2025
Description
Vim, a text editor, is vulnerable to potential data loss with zip.vim and special crafted zip files in versions prior to 9.1.1198. The impact is medium because a user must be made to view such an archive with Vim and then press 'x' on such a strange filename. The issue has been fixed as of Vim patch v9.1.1198.
A flaw was found in Vim's zip.vim plugin. This vulnerability allows potential data loss via specially crafted zip files when a user views the archive in Vim and presses 'x' on an unusual filename.
A flaw was found in Vim's zip.vim plugin. This vulnerability allows potential data loss via specially crafted zip files when a user views the archive in Vim and presses 'x' on an unusual filename.
Solutions
amazon-linux-2023-upgrade-vim-commonamazon-linux-2023-upgrade-vim-dataamazon-linux-2023-upgrade-vim-debuginfoamazon-linux-2023-upgrade-vim-debugsourceamazon-linux-2023-upgrade-vim-default-editoramazon-linux-2023-upgrade-vim-enhancedamazon-linux-2023-upgrade-vim-enhanced-debuginfoamazon-linux-2023-upgrade-vim-filesystemamazon-linux-2023-upgrade-vim-minimalamazon-linux-2023-upgrade-vim-minimal-debuginfoamazon-linux-2023-upgrade-xxdamazon-linux-2023-upgrade-xxd-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.