aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authoreadler <eadler@FreeBSD.org>2012-11-10 12:55:47 +0800
committereadler <eadler@FreeBSD.org>2012-11-10 12:55:47 +0800
commit8916483675b83382dfdc60aea17f02425171024f (patch)
treed2f26326933d8f8a23682b85ee20b2e9dcbbc6b6 /security
parent5f50d36bd66bcb259e49ebbaef5380e2e0d80d53 (diff)
downloadfreebsd-ports-gnome-8916483675b83382dfdc60aea17f02425171024f.tar.gz
freebsd-ports-gnome-8916483675b83382dfdc60aea17f02425171024f.tar.zst
freebsd-ports-gnome-8916483675b83382dfdc60aea17f02425171024f.zip
Apply an upstream patch that fixes a security hole
when receiving a special colored message. The maintainer was contacted but due to the nature of the issue apply the patch ASAP. Approved by: secteam-ports (swills) Security: e02c572f-2af0-11e2-bb44-003067b2972c Feature safe: yes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml30
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1b0eb10ed12e..96ba109b14b9 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,36 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e02c572f-2af0-11e2-bb44-003067b2972c">
+ <topic>weechat -- crash bug from specially crafted messages</topic>
+ <affects>
+ <package>
+ <name>weechat</name>
+ <range><le>0.3.9</le></range>
+ </package>
+ <package>
+ <name>weechat-devel</name>
+ <range><le>20121103</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Sebastien Helleu reports:</p>
+ <blockquote cite="https://savannah.nongnu.org/bugs/?37704">
+ <p>weechat is vulnerable to a crash when sending a special coloured
+ message.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <freebsdpr>ports/173513</freebsdpr>
+ </references>
+ <dates>
+ <discovery>2012-11-09</discovery>
+ <entry>2012-11-10</entry>
+ </dates>
+ </vuln>
+
<vuln vid="5e647ca3-2aea-11e2-b745-001fd0af1a4c">
<topic>lang/ruby19 -- Hash-flooding DoS vulnerability for ruby 1.9</topic>
<affects>