PCRE versions before 7.6 are vulnerable to arbitrary code execution via a buffer overflow. The following patch adds this vulnerability to the VuXML document.
Responsible Changed From-To: freebsd-ports-bugs->secteam Over to maintainer (via the GNATS Auto Assign Tool)
Responsible Changed From-To: secteam->tabthorpe I'll take it.
tabthorpe 2008-03-01 04:08:11 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: - Document pcre -- buffer overflow vulnerability PR: ports/121224 Submitted by: Nick Barkas <snb threerings.net> Revision Changes Path 1.1572 +30 -1 ports/security/vuxml/vuln.xml _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
State Changed From-To: open->closed Committed, with minor changes. Thanks!