Date: Mon, 2 Jan 2017 17:12:49 +0000 (UTC) From: Ryan Steinmetz <zi@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r430381 - head/security/vuxml Message-ID: <201701021712.v02HCnR1098821@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: zi Date: Mon Jan 2 17:12:48 2017 New Revision: 430381 URL: https://svnweb.freebsd.org/changeset/ports/430381 Log: - Document multiple vulnerabilities in w3m ports PR: 215070 Submitted by: kcwu@csie.org Security: eafa3aec-211b-4dd4-9b8a-a664a3f0917a Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Jan 2 17:04:14 2017 (r430380) +++ head/security/vuxml/vuln.xml Mon Jan 2 17:12:48 2017 (r430381) @@ -58,6 +58,65 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="eafa3aec-211b-4dd4-9b8a-a664a3f0917a"> + <topic>w3m -- multiple vulnerabilities</topic> + <affects> + <package> + <name>w3m</name> + <name>w3m-img</name> + <name>ja-w3m</name> + <name>ja-w3m-img</name> + <range><le>0.5.4</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Multiple remote code execution and denial of service conditions present.</p> + </body> + </description> + <references> + <url>http://seclists.org/oss-sec/2016/q4/452</url> + <url>http://seclists.org/oss-sec/2016/q4/516</url> + <cvename>CVE-2016-9422</cvename> + <cvename>CVE-2016-9423</cvename> + <cvename>CVE-2016-9424</cvename> + <cvename>CVE-2016-9425</cvename> + <cvename>CVE-2016-9426</cvename> + <cvename>CVE-2016-9428</cvename> + <cvename>CVE-2016-9429</cvename> + <cvename>CVE-2016-9430</cvename> + <cvename>CVE-2016-9431</cvename> + <cvename>CVE-2016-9432</cvename> + <cvename>CVE-2016-9433</cvename> + <cvename>CVE-2016-9434</cvename> + <cvename>CVE-2016-9435</cvename> + <cvename>CVE-2016-9436</cvename> + <cvename>CVE-2016-9437</cvename> + <cvename>CVE-2016-9438</cvename> + <cvename>CVE-2016-9439</cvename> + <cvename>CVE-2016-9440</cvename> + <cvename>CVE-2016-9441</cvename> + <cvename>CVE-2016-9442</cvename> + <cvename>CVE-2016-9443</cvename> + <cvename>CVE-2016-9622</cvename> + <cvename>CVE-2016-9623</cvename> + <cvename>CVE-2016-9624</cvename> + <cvename>CVE-2016-9625</cvename> + <cvename>CVE-2016-9626</cvename> + <cvename>CVE-2016-9627</cvename> + <cvename>CVE-2016-9628</cvename> + <cvename>CVE-2016-9629</cvename> + <cvename>CVE-2016-9630</cvename> + <cvename>CVE-2016-9631</cvename> + <cvename>CVE-2016-9632</cvename> + <cvename>CVE-2016-9633</cvename> + </references> + <dates> + <discovery>2016-11-03</discovery> + <entry>2017-01-01</entry> + </dates> + </vuln> + <vuln vid="d0b12952-cb86-11e6-906f-0cc47a065786"> <topic>h2o -- Use-after-free vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201701021712.v02HCnR1098821>