View | Details | Raw Unified | Return to bug 212889
Collapse All | Expand All

(-)security/vuxml/vuln.xml (+31 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="f56ab1d1-803d-11e6-889b-a1b48c27adee">
62
    <topic>irssi -- multiple vulnerabilities</topic>
63
    <affects>
64
      <package>
65
	<name>irssi</name>
66
	<range><ge>0.8.17-beta</ge></range>
67
	<range><lt>0.8.20</lt></range>
68
      </package>
69
    </affects>
70
    <description>
71
      <body xmlns="http://www.w3.org/1999/xhtml">
72
	<p>irssi.org reports:</p>
73
	<blockquote cite="https://irssi.org/security/irssi_sa_2016.txt">
74
	  <p>Gabriel Campana and Adrien Guinet from Quarkslab reported two remote
75
	     crash and heap corruption vulnerabilites in Irssi's format parsing code.</p>
76
	  <p>They also provided us with proof of concept exploit code and patches
77
	     to fix those issues.</p>
78
	</blockquote>
79
      </body>
80
    </description>
81
    <references>
82
      <url>https://irssi.org/security/irssi_sa_2016.txt</url>
83
      <cvename>CVE-2016-7044</cvename>
84
      <cvename>CVE-2016-7045</cvename>
85
    </references>
86
    <dates>
87
      <discovery>2016-09-21</discovery>
88
      <entry>2016-09-21</entry>
89
    </dates>
90
  </vuln>
91
61
  <vuln vid="2c57c47e-8bb3-4694-83c8-9fc3abad3964">
92
  <vuln vid="2c57c47e-8bb3-4694-83c8-9fc3abad3964">
62
    <topic>mozilla -- multiple vulnerabilities</topic>
93
    <topic>mozilla -- multiple vulnerabilities</topic>
63
    <affects>
94
    <affects>

Return to bug 212889