From 83771e63da241503dcf935d5020dc76d8e5d8a2b Mon Sep 17 00:00:00 2001
From: Franco Fichtner
Date: Mon, 24 Feb 2020 10:08:17 +0100
Subject: [PATCH] security/vuxml: sync with upstream
Taken from: HardenedBSD
---
security/vuxml/vuln.xml | 36 +++++++++++++++++++++++++++++++++---
1 file changed, 33 insertions(+), 3 deletions(-)
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 56dade48269..b389187375a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,36 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
+
+ WeeChat -- Multiple vulnerabilities
+
+
+ weechat
+ 2.7.1
+
+
+
+
+ The WeeChat project reports:
+
+ Buffer overflow when receiving a malformed IRC message 324 (channel
+ mode). (CVE-2020-8955)
+ Buffer overflow when a new IRC message 005 is received with longer
+ nick prefixes.
+ Crash when receiving a malformed IRC message 352 (WHO).
+
+
+
+
+ https://weechat.org/doc/security/
+ CVE-2020-8955
+
+
+ 2020-02-20
+ 2020-02-21
+
+
+
webkit-gtk3 -- Multiple vulnerabilities
@@ -406,7 +436,7 @@ whitespace)
ksh93
- 2020.0.1_1,1
+ 2020.0.02020.0.1_1,1
ksh93-devel
@@ -58887,7 +58917,7 @@ and CVE-2013-0155.
avidemux26
- 0
+ 2.6.11
kodi
@@ -60758,7 +60788,7 @@ and CVE-2013-0155.
avidemux26
- 0
+ 2.6.11
kodi