aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authordanfe <danfe@FreeBSD.org>2005-02-11 21:33:02 +0800
committerdanfe <danfe@FreeBSD.org>2005-02-11 21:33:02 +0800
commit85ba48d2b92093456664390b94635a9ce0769053 (patch)
tree34e15b3135f481e086df453ce4238d7f8e248a6f /security/vuxml
parentcd45c291b3fdfacc4e078db16ebe95af7dff1b19 (diff)
downloadfreebsd-ports-gnome-85ba48d2b92093456664390b94635a9ce0769053.tar.gz
freebsd-ports-gnome-85ba48d2b92093456664390b94635a9ce0769053.tar.zst
freebsd-ports-gnome-85ba48d2b92093456664390b94635a9ce0769053.zip
- Attempt to fix the exploitable security issue described at
http://www.vuxml.org/freebsd/f2d5e56e-67eb-11d9-a9e7-0001020eed82.html by replacing strcat() with strncat(). Please note that I wasn't able to reproduce the exploit described at http://tigger.uic.edu/~jlongs2/holes/unrtf.txt on my 5.3-STABLE system. Feedback from someone who can reproduce the exploit with an unpatched unrtf would be appreciated - Bump PORTREVISION - Remove old master site that doesn't seem to have the distfile any more VuXML: f2d5e56e-67eb-11d9-a9e7-0001020eed82 PR: ports/76852 Submitted by: Stefan Walter <sw(at)gegenunendlich.de>
Diffstat (limited to 'security/vuxml')
0 files changed, 0 insertions, 0 deletions