diff options
author | pgollucci <pgollucci@FreeBSD.org> | 2010-02-04 07:25:15 +0800 |
---|---|---|
committer | pgollucci <pgollucci@FreeBSD.org> | 2010-02-04 07:25:15 +0800 |
commit | 0d223179c6f2c5916724fe809be8aaa7c734c20c (patch) | |
tree | b76180b7e30024af36bdaf2794f5756728487dbe /security | |
parent | ad5745e1f26e2aa71de5e470436be253505a5ba2 (diff) | |
download | freebsd-ports-gnome-0d223179c6f2c5916724fe809be8aaa7c734c20c.tar.gz freebsd-ports-gnome-0d223179c6f2c5916724fe809be8aaa7c734c20c.tar.zst freebsd-ports-gnome-0d223179c6f2c5916724fe809be8aaa7c734c20c.zip |
- add the rest of the apache 1.3.x packages to the list
that are vulnerable
- add a missing ) to the <topic>
Reviewed by: secteam (miwi)
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 46 |
1 files changed, 44 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b29609172df6..c257ab8f2cd1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -35,12 +35,53 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> <vuln vid="cae01d7b-110d-11df-955a-00219b0fc4d8"> - <topic>apache -- Prevent chunk-size integer overflow on platforms where sizeof(int) < sizeof(long</topic> + <topic>apache -- Prevent chunk-size integer overflow on platforms where sizeof(int) < sizeof(long)</topic> <affects> <package> - <name>apache</name> + <name>apache</name> + <range><lt>1.3.42</lt></range> + </package> + <package> + <name>apache+mod_perl</name> + <range><lt>1.3.42</lt></range> + </package> + <package> + <name>apache+ipv6</name> + <range><lt>1.3.42</lt></range> + </package> + <package> + <name>apache_fp</name> + <range><ge>0</ge></range> + </package> + <package> + <name>ru-apache</name> + <range><lt>1.3.42+30.23</lt></range> + </package> + <package> + <name>ru-apache+mod_ssl</name> <range><lt>1.3.42</lt></range> </package> + <package> + <name>apache+ssl</name> + <range><lt>1.3.42.1.57_2</lt></range> + </package> + <package> + <name>apache+mod_ssl</name> + <name>apache+mod_ssl+ipv6</name> + <name>apache+mod_ssl+mod_accel</name> + <name>apache+mod_ssl+mod_accel+ipv6</name> + <name>apache+mod_ssl+mod_accel+mod_deflate</name> + <name>apache+mod_ssl+mod_accel+mod_deflate+ipv6</name> + <name>apache+mod_ssl+mod_deflate</name> + <name>apache+mod_ssl+mod_deflate+ipv6</name> + <name>apache+mod_ssl+mod_snmp</name> + <name>apache+mod_ssl+mod_snmp+mod_accel</name> + <name>apache+mod_ssl+mod_snmp+mod_accel+ipv6</name> + <name>apache+mod_ssl+mod_snmp+mod_deflate</name> + <name>apache+mod_ssl+mod_snmp+mod_deflate+ipv6</name> + <name>apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6</name> + <range><lt>1.3.42+2.8.27_1</lt></range> + </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> @@ -63,6 +104,7 @@ Note: Please add new entries to the beginning of this file. <dates> <discovery>2009-06-30</discovery> <entry>2010-02-03</entry> + <modified>2010-02-03</modified> </dates> </vuln> |