Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0346

Опубликовано: 26 июн. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0346: Moderate: vim security update (MODERATE)

[7.0.109-3.3]

  • use gzip -9n to avoid multilib fileconflicts

[7.0.109-3.2]

  • Let 'modeline' default to off for root
  • Resolves: bz#238259

[7.0.109-3.1]

  • fix modeline issues
  • Resolves: bz#238259

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

vim-X11

7.0.109-3.el5.3

vim-common

7.0.109-3.el5.3

vim-enhanced

7.0.109-3.el5.3

vim-minimal

7.0.109-3.el5.3

Oracle Linux i386

vim-X11

7.0.109-3.el5.3

vim-common

7.0.109-3.el5.3

vim-enhanced

7.0.109-3.el5.3

vim-minimal

7.0.109-3.el5.3

Связанные CVE

Связанные уязвимости

ubuntu
почти 19 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

redhat
почти 19 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

nvd
почти 19 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

debian
почти 19 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, ...

github
почти 4 года назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.