Date: Mon, 14 Sep 2009 20:06:29 +0000 (UTC) From: Stanislav Sedov <stas@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/security/vuxml vuln.xml Message-ID: <200909142006.n8EK6TvZ064967@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
stas 2009-09-14 20:06:29 UTC
FreeBSD ports repository
Modified files:
security/vuxml vuln.xml
Log:
- Fix formatting.
- Add link to the debian security advisory.
- Fix the description to be the actual citation from the official sources
instead of some wild interpretation. We do not know for sure if remote
code execution is possible at all and from looking to the source code it
seems unlikely as the buffer undeflown is allocated on the heap. Moreover,
it is not clear if this is exploitable in the default install.
Discussed with: az
Revision Changes Path
1.2032 +7 -9 ports/security/vuxml/vuln.xml
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200909142006.n8EK6TvZ064967>
