Bug 257325 - security/vuxml: Document integer overflow vulnerability in redis
Summary: security/vuxml: Document integer overflow vulnerability in redis
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Only Me
Assignee: Li-Wen Hsu
URL:
Keywords:
Depends on:
Blocks: 257326
  Show dependency treegraph
 
Reported: 2021-07-22 07:31 UTC by Yasuhiro Kimura
Modified: 2021-07-27 10:25 UTC (History)
2 users (show)

See Also:
bugzilla: maintainer-feedback? (ports-secteam)


Attachments
Patch file (2.07 KB, patch)
2021-07-22 07:31 UTC, Yasuhiro Kimura
yasu: maintainer-approval? (ports-secteam)
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Yasuhiro Kimura freebsd_committer 2021-07-22 07:31:36 UTC
Created attachment 226599 [details]
Patch file

Document integer overflow vulnerability in redis.
Comment 1 commit-hook freebsd_committer 2021-07-27 10:25:17 UTC
A commit in branch main references this bug:

URL: https://cgit.FreeBSD.org/ports/commit/?id=b40cccda5417dca36863966c90a3d1c7ac6e16e0

commit b40cccda5417dca36863966c90a3d1c7ac6e16e0
Author:     Yasuhiro Kimura <yasu@utahime.org>
AuthorDate: 2021-07-27 10:24:10 +0000
Commit:     Li-Wen Hsu <lwhsu@FreeBSD.org>
CommitDate: 2021-07-27 10:24:10 +0000

    security/vuxml: Document integer overflow vulnerability in redis

    PR:             257325

 security/vuxml/vuln-2021.xml | 43 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 43 insertions(+)