Date: Mon, 14 Sep 2009 20:06:29 +0000 (UTC) From: Stanislav Sedov <stas@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/security/vuxml vuln.xml Message-ID: <200909142006.n8EK6TvZ064967@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
stas 2009-09-14 20:06:29 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: - Fix formatting. - Add link to the debian security advisory. - Fix the description to be the actual citation from the official sources instead of some wild interpretation. We do not know for sure if remote code execution is possible at all and from looking to the source code it seems unlikely as the buffer undeflown is allocated on the heap. Moreover, it is not clear if this is exploitable in the default install. Discussed with: az Revision Changes Path 1.2032 +7 -9 ports/security/vuxml/vuln.xml
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200909142006.n8EK6TvZ064967>