Advisories
Mandriva Advisories
|
![]() |
Problem Description |
Users could embed malicious VIM control codes into a file, and as soon
as any user opened that file in vim-enhanced or vim-X11 with the status
line option enabled in .vimrc, the commands would be executed as that
user.
Updated Packages |
Mandrakelinux 6.0
ef5b006b8cf3a54ce8b7b4a0176c658f 6.0/RPMS/vim-X11-5.7-8.3mdk.i586.rpm b22f3b89a1b8e9751ceb2b4dfa3dad3e 6.0/RPMS/vim-common-5.7-8.3mdk.i586.rpm be4c231a4277f2178dd5538873697d90 6.0/RPMS/vim-enhanced-5.7-8.3mdk.i586.rpm 200896b121a70996b8b904b5657f4bfb 6.0/RPMS/vim-minimal-5.7-8.3mdk.i586.rpm 44043a2bc4508246e38502f5251c389a 6.0/SRPMS/vim-5.7-8.3mdk.src.rpm
Mandrakelinux 6.1
2a0056284e02c7cd9580cbe56264be6f 6.1/RPMS/vim-X11-5.7-8.3mdk.i586.rpm f4f517ca2d4b8355c20cc774df6424d4 6.1/RPMS/vim-common-5.7-8.3mdk.i586.rpm 91a7dbf8c3d20ca6a49c9ecd6e42e813 6.1/RPMS/vim-enhanced-5.7-8.3mdk.i586.rpm 910425951f0ee7b27ebb82ff8688f2a0 6.1/RPMS/vim-minimal-5.7-8.3mdk.i586.rpm 44043a2bc4508246e38502f5251c389a 6.1/SRPMS/vim-5.7-8.3mdk.src.rpm
Mandrakelinux 7.0
c86d17f9601b9bd71ea933ae5cdc3796 7.0/RPMS/vim-X11-5.7-8.3mdk.i586.rpm f780ec72331bce0f4d695e8d788d3bcd 7.0/RPMS/vim-common-5.7-8.3mdk.i586.rpm d1ae880a350371c5d60c129cf9041c14 7.0/RPMS/vim-enhanced-5.7-8.3mdk.i586.rpm d9efca863a0324ea27b2487f90152ad6 7.0/RPMS/vim-minimal-5.7-8.3mdk.i586.rpm 44043a2bc4508246e38502f5251c389a 7.0/SRPMS/vim-5.7-8.3mdk.src.rpm
Mandrakelinux 7.1
2de39e89b7b809c7feec1d46cada1cd0 7.1/RPMS/ctags-3.5.1-8.2mdk.i586.rpm fca25b9309a89b44bb9af01f3de83625 7.1/RPMS/vim-X11-5.7-8.2mdk.i586.rpm c44406fc1e350fceac74d4b5a36d895a 7.1/RPMS/vim-common-5.7-8.2mdk.i586.rpm e5c0c783c65d78b1c7573e321852b2ac 7.1/RPMS/vim-enhanced-5.7-8.2mdk.i586.rpm 1001e618cece22c2a319d60751b1982c 7.1/RPMS/vim-minimal-5.7-8.2mdk.i586.rpm 5998c37d008ce84f361f51426a60c597 7.1/SRPMS/vim-5.7-8.2mdk.src.rpm
Mandrakelinux 7.2
1076ff77ed766322eb728a7703bf88a8 7.2/RPMS/ctags-3.5.1-8.1mdk.i586.rpm 059d7f49bcdc91f1584e988897d81f4e 7.2/RPMS/vim-X11-5.7-8.1mdk.i586.rpm f9d63eaf638a1ef5a96ed282b5b48f9f 7.2/RPMS/vim-common-5.7-8.1mdk.i586.rpm ca275976537ea13575e83bc42deed257 7.2/RPMS/vim-enhanced-5.7-8.1mdk.i586.rpm 37c9ee2542cdcdeb971472be7b13a220 7.2/RPMS/vim-minimal-5.7-8.1mdk.i586.rpm 49c03d7aee3706d607ed2b8b46756817 7.2/SRPMS/vim-5.7-8.1mdk.src.rpm
Corporate Server 1.0.1
2de39e89b7b809c7feec1d46cada1cd0 1.0.1/RPMS/ctags-3.5.1-8.2mdk.i586.rpm fca25b9309a89b44bb9af01f3de83625 1.0.1/RPMS/vim-X11-5.7-8.2mdk.i586.rpm c44406fc1e350fceac74d4b5a36d895a 1.0.1/RPMS/vim-common-5.7-8.2mdk.i586.rpm e5c0c783c65d78b1c7573e321852b2ac 1.0.1/RPMS/vim-enhanced-5.7-8.2mdk.i586.rpm 1001e618cece22c2a319d60751b1982c 1.0.1/RPMS/vim-minimal-5.7-8.2mdk.i586.rpm 5998c37d008ce84f361f51426a60c597 1.0.1/SRPMS/vim-5.7-8.2mdk.src.rpm
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.