lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <E1HlwQm-0006AE-2d@artemis.annvix.ca>
Date: Wed, 09 May 2007 18:22:52 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:101 ] - Updated bind packages fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:101
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : vim
 Date    : May 9, 2007
 Affected: 2007.0, 2007.1
 _______________________________________________________________________
 
 Problem Description:
 
 A vulnerability in vim 7.0's modeline processing capabilities was
 discovered where a user with modelines enabled could open a text file
 containing a carefully crafted modeline, executing arbitrary commands
 as the user running vim.
 
 Updated packages have been patched to prevent this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2438
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 193c5e6f9c4b7fbd883e756fd68e9d9c  2007.0/i586/vim-X11-7.0-16.1mdv2007.0.i586.rpm
 22c359a9bb903b4971c26ef8d820dd8b  2007.0/i586/vim-common-7.0-16.1mdv2007.0.i586.rpm
 78b297d07af026ba2ca661af576753dd  2007.0/i586/vim-enhanced-7.0-16.1mdv2007.0.i586.rpm
 a308c0c95a8feeb08db2e3cd4655360c  2007.0/i586/vim-minimal-7.0-16.1mdv2007.0.i586.rpm 
 f18e2a622218e087cdd0a91d9ae0d53e  2007.0/SRPMS/vim-7.0-16.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 f059a28a227db17faffd2f363b42117a  2007.0/x86_64/vim-X11-7.0-16.1mdv2007.0.x86_64.rpm
 64d32a388460072e1508be8c945d8409  2007.0/x86_64/vim-common-7.0-16.1mdv2007.0.x86_64.rpm
 aa8ce225cc3811dcb76047b65e3dd1c4  2007.0/x86_64/vim-enhanced-7.0-16.1mdv2007.0.x86_64.rpm
 dedd42ccd0b0a1934991d911eab9cb0a  2007.0/x86_64/vim-minimal-7.0-16.1mdv2007.0.x86_64.rpm 
 f18e2a622218e087cdd0a91d9ae0d53e  2007.0/SRPMS/vim-7.0-16.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 ee17731cce031b58b290cf9a61c982c0  2007.1/i586/vim-X11-7.0-16.1mdv2007.1.i586.rpm
 c3d2fd233ac1984af174fdad6c2b4be2  2007.1/i586/vim-common-7.0-16.1mdv2007.1.i586.rpm
 5bf3f905abee7a585d5b11fb2c98b2e8  2007.1/i586/vim-enhanced-7.0-16.1mdv2007.1.i586.rpm
 5138b4b2c511f7608f9db5503f14c6d1  2007.1/i586/vim-minimal-7.0-16.1mdv2007.1.i586.rpm 
 0f068f60ab76873471ebe0992ccc5ccd  2007.1/SRPMS/vim-7.0-16.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 890a4acc16d4b59e59b721f65686b4ef  2007.1/x86_64/vim-X11-7.0-16.1mdv2007.1.x86_64.rpm
 e6498971d58c5fc3fbe6aac03f0ae0fe  2007.1/x86_64/vim-common-7.0-16.1mdv2007.1.x86_64.rpm
 0b4f61e8c8848a10d67a822b04bea7bd  2007.1/x86_64/vim-enhanced-7.0-16.1mdv2007.1.x86_64.rpm
 0776ae51087370ec5ebce9c0996ed5e8  2007.1/x86_64/vim-minimal-7.0-16.1mdv2007.1.x86_64.rpm 
 0f068f60ab76873471ebe0992ccc5ccd  2007.1/SRPMS/vim-7.0-16.1mdv2007.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGQjuFmqjQ0CJFipgRAgaPAKDq9k/P25VQ4erXuk8cznuJrsSbTACg8kLE
6u+Od503dEYQxrf63PILWMc=
=jk4Z
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ