Summary: | <app-editors/gvim-7.3.46: untrusted search path vulnerability (CVE-2010-3914) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | major | CC: | vim |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A2 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
GLSAMaker/CVETool Bot
2011-10-08 13:52:20 UTC
Cleanup is done, please go ahead with the glsa request I'm not clear why we care about this; it looks like this is a Windows-only vuln. (In reply to Chris Reffett from comment #2) > I'm not clear why we care about this; it looks like this is a Windows-only > vuln. That was the original reason it was glsa?. The patch is clearly for windows based .dll's, but needed verification by a second set of eyes. ftp://ftp.vim.org/pub/vim/patches/7.3/7.3.034 hm, looks like windiws-releated issue, indeed. Okay then, bye bye bug. |