Description: Javier Fern
Description: Javier Fernández-Sanguino Peña has reported some vulnerabilities in vim, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. The vulnerabilities are caused due to the tcltags and vimspell.sh scripts creating temporary files insecurely. This can be exploited via symlink attacks to overwrite arbitrary files with the privileges of the user running a vulnerable scripts. The vulnerabilities have been reported in version 6.3. Other versions may also be affected.
Vim please verify and advise.
We don't install either of these.
Those scripts are shipped with app-editors/vim-core : /usr/share/vim/vim63/tools/vimspell.sh /usr/share/vim/vim63/tools/tcltags I guess we should patch them (or remove them) even if they are not directly accessible.
*shrug* I could stick in an rm in the eclass if "being able to mildly irritate users (all one of them) who use a not really working script which isn't placed anywhere inside $PATH and isn't of any use since ctags and vimspell do the job far better" is considered an issue.
Ciaran please either delete them or patch them.
Committed to vim.eclass, r1.89.
Thx Ciaran. Security please vote for GLSA on this one. Personally I vote for no GLSA.
I agree we shouldn't issue an advisory over such scripts (not in common PATH and clearly misc/contrib/not_useful). Fixing this is already a little overkill :)