#2597: Update vim-7.2-fixes-5.patch
---------------------+------------------------------------------------------
 Reporter:  kratz00  |       Owner:  lfs-b...@…                   
     Type:  task     |      Status:  new                          
 Priority:  normal   |   Milestone:  6.7                          
Component:  Book     |     Version:  SVN                          
 Severity:  normal   |    Keywords:                               
---------------------+------------------------------------------------------

Comment(by matt...@…):

 Gilles,

 CVE-2008-6235 - netrw.vim not patched upstream yet[[br]]
 CVE-2008-3076 - netrw.vim not patched upstream yet[[br]]
 CVE-2008-3075 - same root cause as 3074[[br]]
 CVE-2008-3074 - same root cause as 3075 - isn't identified in CVE DB
 though[[br]]
 CVE-2009-0316 - patched in upstream patch 045[[br]]
 CVE-2008-4677 - netrw.vim not patched upstream yet[[br]]
 CVE-2008-4101 - patched in upstream patch 010[[br]]

 So, out of 7 vulnerabilities I can only be confident of fixing 2 of them.
 3 haven't been addressed upstream, from what I can tell, and 2 don't even
 allude to where the problem lies.  Checking whether upstream has fixed
 those is impossible as none of their patches contain CVE numbers!

 Just cherry picking the 2 CVE fixes we know about and putting them in the
 book would, I suspect, give our users a false sense of security.  So, I
 stand by my original assertion that we shouldn't patch Vim at all.

 For anyone interested, my Vim patch generation script is now at
 http://www.linuxfromscratch.org/~matthew/genVimPatch.sh

-- 
Ticket URL: <http://wiki.linuxfromscratch.org/lfs/ticket/2597#comment:6>
LFS Trac <http://wiki.linuxfromscratch.org/lfs/>
Linux From Scratch: Your Distro, Your Rules.
-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-book
FAQ: http://www.linuxfromscratch.org/lfs/faq.html
Unsubscribe: See the above information page

Reply via email to