diff options
author | danfe <danfe@FreeBSD.org> | 2005-02-11 21:33:02 +0800 |
---|---|---|
committer | danfe <danfe@FreeBSD.org> | 2005-02-11 21:33:02 +0800 |
commit | 85ba48d2b92093456664390b94635a9ce0769053 (patch) | |
tree | 34e15b3135f481e086df453ce4238d7f8e248a6f /security/vuxml | |
parent | cd45c291b3fdfacc4e078db16ebe95af7dff1b19 (diff) | |
download | freebsd-ports-gnome-85ba48d2b92093456664390b94635a9ce0769053.tar.gz freebsd-ports-gnome-85ba48d2b92093456664390b94635a9ce0769053.tar.zst freebsd-ports-gnome-85ba48d2b92093456664390b94635a9ce0769053.zip |
- Attempt to fix the exploitable security issue described at
http://www.vuxml.org/freebsd/f2d5e56e-67eb-11d9-a9e7-0001020eed82.html by
replacing strcat() with strncat(). Please note that I wasn't able to
reproduce the exploit described at
http://tigger.uic.edu/~jlongs2/holes/unrtf.txt on my 5.3-STABLE system.
Feedback from someone who can reproduce the exploit with an unpatched unrtf
would be appreciated
- Bump PORTREVISION
- Remove old master site that doesn't seem to have the distfile any more
VuXML: f2d5e56e-67eb-11d9-a9e7-0001020eed82
PR: ports/76852
Submitted by: Stefan Walter <sw(at)gegenunendlich.de>
Diffstat (limited to 'security/vuxml')
0 files changed, 0 insertions, 0 deletions