Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 12 Sep 2008 00:28:28 +0100
From: "Jan Minář" <rdancer@...ncer.org>
To: oss-security@...ts.openwall.com, coley@...re.org, 
	"Tomas Hoger" <thoger@...hat.com>, 
	"Karsten Hopp" <karsten@...hat.com>
Subject: Re: [oss-list] CVE request (vim)

On Thu, Sep 11, 2008 at 3:56 PM, Jan Lieskovsky <jlieskov@...hat.com> wrote:
> Hello Steve,
>
>  found relatively old issue in Vim, which was not covered
> by the CVE-2008-2712 patch. Could you please assign a new
> CVE id for it:
>
> Report: http://www.rdancer.org/vulnerablevim-K.html  [1]
> Proposed patch: http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2

That's an early version.  The latest from me was the version 3 (three)
of the patch -- attachment of this message:

http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33

The whole thread is illustrative.

Also, patch 7.2.010 [0] addresses the issue (I'm not aware of anybody
having analyzing it properly, as to what extent it really eradicates
the vulnerability.  If anybody is going to do that, please keep me
CC'd.).

[0] http://ftp.vim.org/pub/vim/patches/7.2/7.2.010

HTH,
Jan.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.