aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorpgollucci <pgollucci@FreeBSD.org>2010-02-04 07:25:15 +0800
committerpgollucci <pgollucci@FreeBSD.org>2010-02-04 07:25:15 +0800
commit0d223179c6f2c5916724fe809be8aaa7c734c20c (patch)
treeb76180b7e30024af36bdaf2794f5756728487dbe /security
parentad5745e1f26e2aa71de5e470436be253505a5ba2 (diff)
downloadfreebsd-ports-gnome-0d223179c6f2c5916724fe809be8aaa7c734c20c.tar.gz
freebsd-ports-gnome-0d223179c6f2c5916724fe809be8aaa7c734c20c.tar.zst
freebsd-ports-gnome-0d223179c6f2c5916724fe809be8aaa7c734c20c.zip
- add the rest of the apache 1.3.x packages to the list
that are vulnerable - add a missing ) to the <topic> Reviewed by: secteam (miwi)
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml46
1 files changed, 44 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index b29609172df6..c257ab8f2cd1 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -35,12 +35,53 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="cae01d7b-110d-11df-955a-00219b0fc4d8">
- <topic>apache -- Prevent chunk-size integer overflow on platforms where sizeof(int) &lt; sizeof(long</topic>
+ <topic>apache -- Prevent chunk-size integer overflow on platforms where sizeof(int) &lt; sizeof(long)</topic>
<affects>
<package>
- <name>apache</name>
+ <name>apache</name>
+ <range><lt>1.3.42</lt></range>
+ </package>
+ <package>
+ <name>apache+mod_perl</name>
+ <range><lt>1.3.42</lt></range>
+ </package>
+ <package>
+ <name>apache+ipv6</name>
+ <range><lt>1.3.42</lt></range>
+ </package>
+ <package>
+ <name>apache_fp</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <name>ru-apache</name>
+ <range><lt>1.3.42+30.23</lt></range>
+ </package>
+ <package>
+ <name>ru-apache+mod_ssl</name>
<range><lt>1.3.42</lt></range>
</package>
+ <package>
+ <name>apache+ssl</name>
+ <range><lt>1.3.42.1.57_2</lt></range>
+ </package>
+ <package>
+ <name>apache+mod_ssl</name>
+ <name>apache+mod_ssl+ipv6</name>
+ <name>apache+mod_ssl+mod_accel</name>
+ <name>apache+mod_ssl+mod_accel+ipv6</name>
+ <name>apache+mod_ssl+mod_accel+mod_deflate</name>
+ <name>apache+mod_ssl+mod_accel+mod_deflate+ipv6</name>
+ <name>apache+mod_ssl+mod_deflate</name>
+ <name>apache+mod_ssl+mod_deflate+ipv6</name>
+ <name>apache+mod_ssl+mod_snmp</name>
+ <name>apache+mod_ssl+mod_snmp+mod_accel</name>
+ <name>apache+mod_ssl+mod_snmp+mod_accel+ipv6</name>
+ <name>apache+mod_ssl+mod_snmp+mod_deflate</name>
+ <name>apache+mod_ssl+mod_snmp+mod_deflate+ipv6</name>
+ <name>apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6</name>
+ <range><lt>1.3.42+2.8.27_1</lt></range>
+ </package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
@@ -63,6 +104,7 @@ Note: Please add new entries to the beginning of this file.
<dates>
<discovery>2009-06-30</discovery>
<entry>2010-02-03</entry>
+ <modified>2010-02-03</modified>
</dates>
</vuln>