Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A format string vulnerability in the helptags support in vim allows
user-assisted remote attackers to execute arbitrary code via format
string specifiers in a help-tags tag in a help file.
Updated packages have been patched to prevent this issue.
Updated Packages |
Mandriva Linux 2007
4df32e9d14fec452d86a7c287e2c5a6b 2007.0/i586/vim-X11-7.0-16.2mdv2007.0.i586.rpm e23ccd24386377b643be53e513a27a16 2007.0/i586/vim-common-7.0-16.2mdv2007.0.i586.rpm 8e3a12c770c364d4c2f93781a32c480a 2007.0/i586/vim-enhanced-7.0-16.2mdv2007.0.i586.rpm 892e4ce49c3ede2145a5588e1e2ef96a 2007.0/i586/vim-minimal-7.0-16.2mdv2007.0.i586.rpm 4312f54d280078742dc0edbd781cf9a9 2007.0/SRPMS/vim-7.0-16.2mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
6c7f63287b2488e9f8a650719387953f 2007.0/x86_64/vim-X11-7.0-16.2mdv2007.0.x86_64.rpm d77d8946bfa7b59c02e703dc33d93bdd 2007.0/x86_64/vim-common-7.0-16.2mdv2007.0.x86_64.rpm 8567e4977e444fb25bba9672a4e21f6e 2007.0/x86_64/vim-enhanced-7.0-16.2mdv2007.0.x86_64.rpm 05489f2fb7af81e0463edda47313a09a 2007.0/x86_64/vim-minimal-7.0-16.2mdv2007.0.x86_64.rpm 4312f54d280078742dc0edbd781cf9a9 2007.0/SRPMS/vim-7.0-16.2mdv2007.0.src.rpm
Corporate Server 4.0
1f72bdb91cb922bd481a0807c02c6615 corporate/4.0/i586/vim-X11-6.3-21.1.20060mlcs4.i586.rpm 5019a421fff7c4128a4752583626a7bd corporate/4.0/i586/vim-common-6.3-21.1.20060mlcs4.i586.rpm b388e4639bfa4d0fa55547da188a8bbf corporate/4.0/i586/vim-enhanced-6.3-21.1.20060mlcs4.i586.rpm e2b9ac79021d5c0c26392cad7eca01bc corporate/4.0/i586/vim-minimal-6.3-21.1.20060mlcs4.i586.rpm 204cb63a13ae22882d85762a0c978491 corporate/4.0/SRPMS/vim-6.3-21.1.20060mlcs4.src.rpm
Corporate Server 4.0/X86_64
ad146b31421a92d1d5ae9016aa19712e corporate/4.0/x86_64/vim-X11-6.3-21.1.20060mlcs4.x86_64.rpm ee095f93cd613ec271bb59742b018ea5 corporate/4.0/x86_64/vim-common-6.3-21.1.20060mlcs4.x86_64.rpm 502c543d2328f21ba4718dde2fb5671c corporate/4.0/x86_64/vim-enhanced-6.3-21.1.20060mlcs4.x86_64.rpm 8784c5496b674036f75d55d296f7f1a8 corporate/4.0/x86_64/vim-minimal-6.3-21.1.20060mlcs4.x86_64.rpm 204cb63a13ae22882d85762a0c978491 corporate/4.0/SRPMS/vim-6.3-21.1.20060mlcs4.src.rpm
Mandriva Linux 2007.1
49f6595dc0c234c5e6a74577a3c3e1b1 2007.1/i586/vim-X11-7.0-16.2mdv2007.1.i586.rpm 591861822c799ecd326b5bc033bb0675 2007.1/i586/vim-common-7.0-16.2mdv2007.1.i586.rpm 2674fa0b9a74bc83639674303b80aed6 2007.1/i586/vim-enhanced-7.0-16.2mdv2007.1.i586.rpm eb42f52b13e87cebf68cab82241c2b8e 2007.1/i586/vim-minimal-7.0-16.2mdv2007.1.i586.rpm f42b56d6c68b33111c6ac849ac4ea9fc 2007.1/SRPMS/vim-7.0-16.2mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64
e29b917280c5f713beece159ccab1a33 2007.1/x86_64/vim-X11-7.0-16.2mdv2007.1.x86_64.rpm 91f967b265bada8cbda25f4e5196e6d6 2007.1/x86_64/vim-common-7.0-16.2mdv2007.1.x86_64.rpm 2315edb118fb799109bf949cac578eb2 2007.1/x86_64/vim-enhanced-7.0-16.2mdv2007.1.x86_64.rpm de69f95b501ab2f7343946c99fd5b3cb 2007.1/x86_64/vim-minimal-7.0-16.2mdv2007.1.x86_64.rpm f42b56d6c68b33111c6ac849ac4ea9fc 2007.1/SRPMS/vim-7.0-16.2mdv2007.1.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2953
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.