View | Details | Raw Unified | Return to bug 225804
Collapse All | Expand All

(-)security/vuxml/vuln.xml (+29 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="3b3ff6ec-0e5e-11e8-99b0-d017c2987f9a">
62
    <topic>uwsgi -- stack-based buffer overflow</topic>
63
    <affects>
64
      <package>
65
	<name>uwsgi</name>
66
	<range><lt>2.0.16</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>uwsgi reports:</p>
72
	<blockquote cite="https://github.com/unbit/uwsgi-docs/blob/master/Changelog-2.0.16.rst">
73
	  <p>The uwsgi_expand_path() function in core/utils.c in Unbit uWSGI
74
	    before 2.0.16 has a stack-based buffer overflow via a large directory
75
	    length.</p>
76
	</blockquote>
77
      </body>
78
    </description>
79
    <references>
80
      <url>https://github.com/unbit/uwsgi-docs/blob/master/Changelog-2.0.16.rst</url>
81
      <url>https://github.com/unbit/uwsgi/commit/ed1c3bbc6cfc4d566401526fd21ba0984dd7b22a</url>
82
      <cvename>CVE-2018-6758</cvename>
83
    </references>
84
    <dates>
85
      <discovery>2018-02-06</discovery>
86
      <entry>2018-02-10</entry>
87
    </dates>
88
  </vuln>
89
61
  <vuln vid="7a2e0063-0e4e-11e8-94c0-5453ed2e2b49">
90
  <vuln vid="7a2e0063-0e4e-11e8-94c0-5453ed2e2b49">
62
    <topic>p7zip-codec-rar -- insufficient error handling</topic>
91
    <topic>p7zip-codec-rar -- insufficient error handling</topic>
63
    <affects>
92
    <affects>

Return to bug 225804