Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 14 Sep 2009 20:06:29 +0000 (UTC)
From:      Stanislav Sedov <stas@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <200909142006.n8EK6TvZ064967@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
stas        2009-09-14 20:06:29 UTC

  FreeBSD ports repository

  Modified files:
    security/vuxml       vuln.xml 
  Log:
  - Fix formatting.
  - Add link to the debian security advisory.
  - Fix the description to be the actual citation from the official sources
    instead of some wild interpretation.  We do not know for sure if remote
    code execution is possible at all and from looking to the source code it
    seems unlikely as the buffer undeflown is allocated on the heap.  Moreover,
    it is not clear if this is exploitable in the default install.
  
  Discussed with: az
  
  Revision  Changes    Path
  1.2032    +7 -9      ports/security/vuxml/vuln.xml



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200909142006.n8EK6TvZ064967>