diff options
author | simon <simon@FreeBSD.org> | 2004-12-01 23:30:46 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2004-12-01 23:30:46 +0800 |
commit | 13b4e2d88e36162b15d24e38982bd091e9ee705f (patch) | |
tree | a52232916829ff554b2aba7311e35f6461e15b44 /security | |
parent | 0567f0d47f282567fad9d8213f24bfbf26c4e31d (diff) | |
download | freebsd-ports-gnome-13b4e2d88e36162b15d24e38982bd091e9ee705f.tar.gz freebsd-ports-gnome-13b4e2d88e36162b15d24e38982bd091e9ee705f.tar.zst freebsd-ports-gnome-13b4e2d88e36162b15d24e38982bd091e9ee705f.zip |
Document signal delivery vulnerability in sudoscript.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1d4be88822c6..4f14b715b57b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,29 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="85edfb6a-43a5-11d9-a9e7-0001020eed82"> + <topic>sudoscript -- signal delivery vulnerability</topic> + <affects> + <package> + <name>sudoscript</name> + <range><lt>2.1.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>If non-root access is enabled in sudoscript, any member of + the ssers group can send a SIGHUP signal to any process.</p> + </body> + </description> + <references> + <url>http://egbok.com/sudoscript/archives/2004/11/sudoscript_212.html</url> + </references> + <dates> + <discovery>2004-11-14</discovery> + <entry>2004-12-01</entry> + </dates> + </vuln> + <vuln vid="553224e7-4325-11d9-a3d5-000c6e8f12ef"> <topic>jabberd -- remote buffer overflow vulnerability</topic> <affects> |