aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorriggs <riggs@FreeBSD.org>2017-03-18 21:57:40 +0800
committerriggs <riggs@FreeBSD.org>2017-03-18 21:57:40 +0800
commit01825346aade8924bc039bfb6b942984f064aa4b (patch)
tree44a0507c4f1651e94b3761c58a020f054212c8f2 /security
parent0d86e2b2d5b0d1b12b3e91d336cdc5ea6457b7f3 (diff)
downloadfreebsd-ports-gnome-01825346aade8924bc039bfb6b942984f064aa4b.tar.gz
freebsd-ports-gnome-01825346aade8924bc039bfb6b942984f064aa4b.tar.zst
freebsd-ports-gnome-01825346aade8924bc039bfb6b942984f064aa4b.zip
Document use-after-free vulnerability in irc/irssi
PR: 217878
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml28
1 files changed, 28 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 62969a43d0ad..fcd26425b1d8 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,34 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="06f931c0-0be0-11e7-b4bf-5404a68ad561">
+ <topic>irssi -- use-after-free potential code execution</topic>
+ <affects>
+ <package>
+ <name>irssi</name>
+ <range><gt>0.8.21,1</gt><lt>1.0.2,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The irssi project reports:</p>
+ <blockquote cite="https://irssi.org/security/irssi_sa_2017_03.txt">
+ <p>Use after free while producing list of netjoins (CWE-416).
+ This issue was found and reported to us by APic.
+ This issue usually leads to segmentation faults.
+ Targeted code execution should be difficult.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://irssi.org/security/irssi_sa_2017_03.txt</url>
+ </references>
+ <dates>
+ <discovery>2017-03-11</discovery>
+ <entry>2017-03-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7c27192f-0bc3-11e7-9940-b499baebfeaf">
<topic>mysql -- denial of service vulnerability</topic>
<affects>