Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 11 Sep 2008 19:19:11 +0300
From: Pınar Yanardağ <pinar@...dus.org.tr>
To: oss-security@...ts.openwall.com
Subject: Re: [oss-list] CVE request (vim)

Hi Jan,


Jan Lieskovsky wrote On 09/11/2008 05:56 PM:
> (...)
>
> Report: http://www.rdancer.org/vulnerablevim-K.html  [1]
> Proposed patch: http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2
>   


Unfortunately, this patch was incomplete and  rdancer has released 
another patch for this issue:

http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/f730da13efe2dd73?hide_quotes=no#msg_9290f26f9bc11b33

Cheers,

-- 
Pınar Yanardağ (a.k.a PINguAR)
http://pinguar.org
_____________________________

"Always program as if the person who will be maintaining your program is a violent psychopath that knows where you live."
-- Martin Golding


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ