Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#7087 - Warning on vim
Attached to Project:
Arch Linux
Opened by DaNiMoTh (DaNiMoTh) - Monday, 07 May 2007, 09:24 GMT
Last edited by Tobias Powalowski (tpowa) - Wednesday, 09 May 2007, 16:15 GMT
Opened by DaNiMoTh (DaNiMoTh) - Monday, 07 May 2007, 09:24 GMT
Last edited by Tobias Powalowski (tpowa) - Wednesday, 09 May 2007, 16:15 GMT
|
Details------------------------------------------------------------
Arch Linux Security Warning ALSW 2007-#28 ------------------------------------------------------------ Name: vim Date: 2007-05-07 Severity: Low Warning #: 2007-#28 ------------------------------------------------------------ Product Background =================== A highly configurable, improved version of the vi text editor built to enable efficient text editing Problem Background - Impact =================== Previous versions of the vim package allowed two functions, feedkeys() and writefile(), to be used in the sandbox. Functions executed via modelines in files being edited are verified by the sandbox; a user who is coerced into opening a specially-crafted file could cause the system to execute arbitrary shell code supplied by the attacker. Problem Packages =================== Package: vim Repo: current Group: base Unsafe: < 7.0.235 Safe: >= 7.0.235 Package Fix =================== Vim developers have released 234 and 235 patch, which fix this issue. I'm not sure, but the lastest 7.0 tarball in the /unix directory of mirrors has already included this patchset. =================== Unofficial ArchLinux Security Bug Tracker: http://jjdanimoth.netsons.org/alsw.html Reference(s) =================== https://issues.rpath.com/browse/RPL-1320 |
This task depends upon