aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorThierry Thomas <thierry@FreeBSD.org>2005-03-13 10:31:19 +0000
committerThierry Thomas <thierry@FreeBSD.org>2005-03-13 10:31:19 +0000
commitc3c8132fc3247cbbc3605536250558e4ef61a5f6 (patch)
tree162b897aa5026063fc7731dc7562f6711cd0d532 /security
parente7281b5dcd8e92aac817657a6dd497dcd193984c (diff)
downloadports-c3c8132fc3247cbbc3605536250558e4ef61a5f6.tar.gz
ports-c3c8132fc3247cbbc3605536250558e4ef61a5f6.zip
Add an entry about rxvt-unicode bufer overflow.
Notes
Notes: svn path=/head/; revision=131078
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml27
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c2ee7132691e..5e178a778821 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d4bd4046-93a6-11d9-8378-000bdb1444a4">
+ <topic>rxvt-unicode -- buffer overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>rxvt-unicode</name>
+ <range><lt>5.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A rxvt-unicode changelog reports:</p>
+ <blockquote cite="http://dist.schmorp.de/rxvt-unicode/Changes">
+ <p>Fix a bug that allowed to overflow a buffer via a long
+ escape sequence, which is probably exploitable (fix by
+ Rob Holland / Yoann Vandoorselaere / Gentoo Audit Team).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://dist.schmorp.de/rxvt-unicode/Changes</url>
+ </references>
+ <dates>
+ <discovery>2005-03-13</discovery>
+ <entry>2005-03-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="a7062952-9023-11d9-a22c-0001020eed82">
<topic>phpmyadmin -- information disclosure vulnerability</topic>
<affects>