diff options
author | Xin LI <delphij@FreeBSD.org> | 2007-11-06 18:28:58 +0000 |
---|---|---|
committer | Xin LI <delphij@FreeBSD.org> | 2007-11-06 18:28:58 +0000 |
commit | 35af81b4febeb05d2e6226781bc09c8368108376 (patch) | |
tree | 941f34a2f4db87391e0008ebec0e887834aae40f /security/vuxml/vuln.xml | |
parent | 87cfb3c46647d492b416ff1e4b279cb6ff741c2e (diff) | |
download | ports-35af81b4febeb05d2e6226781bc09c8368108376.tar.gz ports-35af81b4febeb05d2e6226781bc09c8368108376.zip |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index fefc4574301a..6de6f2cb2b21 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,43 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="bfd6eef4-8c94-11dc-8c55-001c2514716c"> + <topic>pcre -- arbitrary code execution</topic> + <affects> + <package> + <name>pcre</name> + <name>pcre-utf8</name> + <range><lt>7.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Debian project reports:</p> + <blockquote cite="http://www.debian.org/security/2007/dsa-1399"> + <p>Tavis Ormandy of the Google Security Team has discovered + several security issues in PCRE, the Perl-Compatible Regular + Expression library, which potentially allow attackers to + execute arbitrary code by compiling specially crafted regular + expressions.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2007-1659</cvename> + <cvename>CVE-2007-1660</cvename> + <cvename>CVE-2007-1661</cvename> + <cvename>CVE-2007-1662</cvename> + <cvename>CVE-2007-4766</cvename> + <cvename>CVE-2007-4767</cvename> + <cvename>CVE-2007-4768</cvename> + <url>http://www.pcre.org/changelog.txt</url> + </references> + <dates> + <discovery>2007-11-05</discovery> + <entry>2007-11-06</entry> + </dates> + </vuln> + <vuln vid="617a4021-8bf0-11dc-bffa-0016179b2dd5"> <topic>perdition -- str_vwrite format string vulnerability</topic> <affects> |