Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0346

Опубликовано: 26 июн. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0346: Moderate: vim security update (MODERATE)

[7.0.109-3.3]

  • use gzip -9n to avoid multilib fileconflicts

[7.0.109-3.2]

  • Let 'modeline' default to off for root
  • Resolves: bz#238259

[7.0.109-3.1]

  • fix modeline issues
  • Resolves: bz#238259

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

vim-X11

7.0.109-3.el5.3

vim-common

7.0.109-3.el5.3

vim-enhanced

7.0.109-3.el5.3

vim-minimal

7.0.109-3.el5.3

Oracle Linux i386

vim-X11

7.0.109-3.el5.3

vim-common

7.0.109-3.el5.3

vim-enhanced

7.0.109-3.el5.3

vim-minimal

7.0.109-3.el5.3

Связанные CVE

Связанные уязвимости

ubuntu
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

redhat
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

nvd
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

debian
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, ...

github
больше 3 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.