[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <E1HlwQm-0006AI-4a@artemis.annvix.ca>
Date: Wed, 09 May 2007 18:22:52 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:101 ] - Updated bind packages fix
vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:101
http://www.mandriva.com/security/
_______________________________________________________________________
Package : vim
Date : May 9, 2007
Affected: 2007.0, 2007.1
_______________________________________________________________________
Problem Description:
A vulnerability in vim 7.0's modeline processing capabilities was
discovered where a user with modelines enabled could open a text file
containing a carefully crafted modeline, executing arbitrary commands
as the user running vim.
Updated packages have been patched to prevent this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2438
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
193c5e6f9c4b7fbd883e756fd68e9d9c 2007.0/i586/vim-X11-7.0-16.1mdv2007.0.i586.rpm
22c359a9bb903b4971c26ef8d820dd8b 2007.0/i586/vim-common-7.0-16.1mdv2007.0.i586.rpm
78b297d07af026ba2ca661af576753dd 2007.0/i586/vim-enhanced-7.0-16.1mdv2007.0.i586.rpm
a308c0c95a8feeb08db2e3cd4655360c 2007.0/i586/vim-minimal-7.0-16.1mdv2007.0.i586.rpm
f18e2a622218e087cdd0a91d9ae0d53e 2007.0/SRPMS/vim-7.0-16.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
f059a28a227db17faffd2f363b42117a 2007.0/x86_64/vim-X11-7.0-16.1mdv2007.0.x86_64.rpm
64d32a388460072e1508be8c945d8409 2007.0/x86_64/vim-common-7.0-16.1mdv2007.0.x86_64.rpm
aa8ce225cc3811dcb76047b65e3dd1c4 2007.0/x86_64/vim-enhanced-7.0-16.1mdv2007.0.x86_64.rpm
dedd42ccd0b0a1934991d911eab9cb0a 2007.0/x86_64/vim-minimal-7.0-16.1mdv2007.0.x86_64.rpm
f18e2a622218e087cdd0a91d9ae0d53e 2007.0/SRPMS/vim-7.0-16.1mdv2007.0.src.rpm
Mandriva Linux 2007.1:
ee17731cce031b58b290cf9a61c982c0 2007.1/i586/vim-X11-7.0-16.1mdv2007.1.i586.rpm
c3d2fd233ac1984af174fdad6c2b4be2 2007.1/i586/vim-common-7.0-16.1mdv2007.1.i586.rpm
5bf3f905abee7a585d5b11fb2c98b2e8 2007.1/i586/vim-enhanced-7.0-16.1mdv2007.1.i586.rpm
5138b4b2c511f7608f9db5503f14c6d1 2007.1/i586/vim-minimal-7.0-16.1mdv2007.1.i586.rpm
0f068f60ab76873471ebe0992ccc5ccd 2007.1/SRPMS/vim-7.0-16.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
890a4acc16d4b59e59b721f65686b4ef 2007.1/x86_64/vim-X11-7.0-16.1mdv2007.1.x86_64.rpm
e6498971d58c5fc3fbe6aac03f0ae0fe 2007.1/x86_64/vim-common-7.0-16.1mdv2007.1.x86_64.rpm
0b4f61e8c8848a10d67a822b04bea7bd 2007.1/x86_64/vim-enhanced-7.0-16.1mdv2007.1.x86_64.rpm
0776ae51087370ec5ebce9c0996ed5e8 2007.1/x86_64/vim-minimal-7.0-16.1mdv2007.1.x86_64.rpm
0f068f60ab76873471ebe0992ccc5ccd 2007.1/SRPMS/vim-7.0-16.1mdv2007.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFGQjuFmqjQ0CJFipgRAgaPAKDq9k/P25VQ4erXuk8cznuJrsSbTACg8kLE
6u+Od503dEYQxrf63PILWMc=
=jk4Z
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists