[<prev] [next>] [day] [month] [year] [list]
Message-ID: <46aeb518.zY4153i1sXvWKk1d%announce-noreply@rpath.com>
Date: Tue, 31 Jul 2007 00:05:44 -0400
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com,
update-announce@...ts.rpath.com
Cc: full-disclosure@...ts.grok.org.uk, vulnwatch@...nwatch.org,
bugtraq@...urityfocus.com, lwn@....net
Subject: rPSA-2007-0151-1 gvim vim vim-minimal
rPath Security Advisory: 2007-0151-1
Published: 2007-07-31
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
Updated Versions:
gvim=/conary.rpath.com@rpl:devel//1/6.3.90-2.6-1
vim=/conary.rpath.com@rpl:devel//1/6.3.90-2.6-1
vim-minimal=/conary.rpath.com@rpl:devel//1/6.3.90-2.6-1
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2953
https://issues.rpath.com/browse/RPL-1595
Description:
Previous versions of the vim package are vulnerable to a user-assisted
attack in which vim may execute arbitrary code when helptags is run on
data that has been maliciously crafted.
Copyright 2007 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html
Powered by blists - more mailing lists