aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--security/vuxml/vuln.xml30
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 85597fd5cac9..c8837ed58e11 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,36 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="10fd731c-8088-11e9-b6ae-001871ec5271">
+ <topic>cyrus-imapd -- buffer overrun in httpd</topic>
+ <affects>
+ <package>
+ <name>cyrus-imapd30</name>
+ <range><ge>3.0.0</ge><lt>3.0.10</lt></range>
+ </package>
+ <package>
+ <name>cyrus-imapd25</name>
+ <range><ge>2.5.0</ge><lt>2.5.13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cyrus IMAP 3.0.10 Release Notes states:</p>
+ <blockquote cite="https://www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.10.html">
+ <p>Fixed CVE-2019-11356: buffer overrun in httpd</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-11356</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11356</url>
+ </references>
+ <dates>
+ <discovery>2019-04-19</discovery>
+ <entry>2019-05-27</entry>
+ </dates>
+ </vuln>
+
<vuln vid="3ba87032-7fbd-11e9-8a5f-c85b76ce9b5a">
<topic>serendipity -- XSS</topic>
<affects>