Date: Mon, 8 Aug 2016 15:47:23 +0000 (UTC) From: Brad Davis <brd@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r419861 - head/security/vuxml Message-ID: <201608081547.u78FlNlF041181@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: brd Date: Mon Aug 8 15:47:23 2016 New Revision: 419861 URL: https://svnweb.freebsd.org/changeset/ports/419861 Log: Document collectd security advisory. PR: 211613 Security: CVE-2016-6254 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Aug 8 15:22:34 2016 (r419860) +++ head/security/vuxml/vuln.xml Mon Aug 8 15:47:23 2016 (r419861) @@ -58,6 +58,34 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6da45e38-5b55-11e6-8859-000c292ee6b8"> + <topic>collectd -- Network plugin heap overflow</topic> + <affects> + <package> + <name>collectd</name> + <range><lt>5.5.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The collectd Project reports:</p> + <blockquote cite="http://collectd.org/news.shtml#news98"> + <p>Emilien Gaspar has identified a heap overflow in collectd's + network plugin which can be triggered remotely and is potentially + exploitable.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-6254</cvename> + <url>http://collectd.org/news.shtml#news98</url> + </references> + <dates> + <discovery>2016-07-26</discovery> + <entry>2016-08-05</entry> + </dates> + </vuln> + <vuln vid="3ddcb42b-5b78-11e6-b334-002590263bf5"> <topic>moodle -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201608081547.u78FlNlF041181>