aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorlofi <lofi@FreeBSD.org>2004-08-13 05:17:31 +0800
committerlofi <lofi@FreeBSD.org>2004-08-13 05:17:31 +0800
commit6c3cb376c7b18b20a94d97a7c06c5270e29cb9cf (patch)
tree844f77bb69e56f8b0e8e7d2d387252df050dff11 /security
parent662ff966c07b709fa233e5901fe066ceeee1b5a1 (diff)
downloadfreebsd-ports-gnome-6c3cb376c7b18b20a94d97a7c06c5270e29cb9cf.tar.gz
freebsd-ports-gnome-6c3cb376c7b18b20a94d97a7c06c5270e29cb9cf.tar.zst
freebsd-ports-gnome-6c3cb376c7b18b20a94d97a7c06c5270e29cb9cf.zip
Correct entries for recent kde vuln's and add new entry for kdelibs
(3.2.3_3 didn't have all patches).
Diffstat (limited to 'security')
-rw-r--r--security/portaudit-db/database/portaudit.txt4
1 files changed, 3 insertions, 1 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index fefc3fd6d47a..989f2baf8e23 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -65,6 +65,8 @@ cvstrac<1.1.4|http://www.securityfocus.com/archive/1/370955 http://secunia.com/a
p5-Mail-SpamAssassin<2.64|http://secunia.com/advisories/12255 http://marc.theaimsgroup.com/?l=spamassassin-announce&m=109168121628767&w=2|SpamAssassin DoS vulnerability|bacbc357-ea65-11d8-9440-000347a4fa7d
cfengine2<2.1.8|http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 http://secunia.com/advisories/12251|cfengine authentication heap corruption|f2a1dc8b-ea66-11d8-9440-000347a4fa7d
libxine<=1.0.r5_1|http://www.open-security.org/advisories/6 http://secunia.com/advisories/12194 http://sourceforge.net/mailarchive/forum.php?thread_id=5143955&forum_id=11923|libxine vcd MRL input identifier management overflow|bef4515b-eaa9-11d8-9440-000347a4fa7d
-kdelibs<=3.2.3_1|http://www.kde.org/info/security/advisory-20040811-1.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689 http://www.kde.org/info/security/advisory-20040811-2.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0690 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386 http://www.kde.org/info/security/advisory-20040811-3.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 http://secunia.com/advisories/11978/ http://www.heise.de/newsticker/meldung/48793 http://bugs.kde.org/show_bug.cgi?id=84352|Temporary Directory Vulnerability, DCOPServer Temporary Filename Vulnerability, Konqueror Frame Injection Vulnerability|a4bd1cd3-eb25-11d8-978e-00e018f69096
+kdelibs<=3.2.3_1|http://www.kde.org/info/security/advisory-20040811-1.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689 http://www.kde.org/info/security/advisory-20040811-2.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0690 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386 http://www.kde.org/info/security/advisory-20040811-3.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 http://secunia.com/advisories/11978/ http://www.heise.de/newsticker/meldung/48793 http://bugs.kde.org/show_bug.cgi?id=84352|Temporary Directory Vulnerability, Konqueror Frame Injection Vulnerability|a4bd1cd3-eb25-11d8-978e-00e018f69096
kdebase<=3.2.3|http://www.kde.org/info/security/advisory-20040811-3.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 http://www.heise.de/newsticker/meldung/48793 http://bugs.kde.org/show_bug.cgi?id=84352|Konqueror Frame Injection Vulnerability|2e395baa-eb26-11d8-978e-00e018f69096
+kdelibs<=3.2.3_3|http://www.kde.org/info/security/advisory-20040811-1.txt|DCOPServer Temporary Filename Vulnerability|608ceab8-eca3-11d8-afa6-ed04757064bb
rsync<2.6.2_2|http://lists.samba.org/archive/rsync-announce/2004/000017.html|security hole in non-chroot rsync daemon|2689f4cb-ec4c-11d8-9440-000347a4fa7d
+kdelibs<=3.2.3_3|http://www.kde.org/info/security/advisory-20040811-1.txt|DCOPServer Temporary Filename Vulnerability|608ceab8-eca3-11d8-afa6-ed04757064bb