lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 16 Dec 2004 08:40:54 +0300
From: "Alexey I. Froloff" <raorn@...o.ru>
To: bugtraq@...urityfocus.com
Subject: Re: [ GLSA 200412-10 ] Vim, gVim: Vulnerable options in modelines

* Thierry Carrez <koon@> [041215 21:52]:
>   Severity: Normal
>      Title: Vim, gVim: Vulnerable options in modelines
> Workaround
> ==========
> There is no known workaround at this time.
There is workaround - add "set nomodeline" in vimrc.

-- 
Regards, Alexey I. Froloff
AIF5-RIPN, AIF5-RIPE
-------------------------------------------
  Inform-Mobil, Ltd. System Administrator
       http://www.inform-mobil.ru/
Tel: +7(095)504-4709, Fax: +7(095)513-1006

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ