From 83771e63da241503dcf935d5020dc76d8e5d8a2b Mon Sep 17 00:00:00 2001 From: Franco Fichtner Date: Mon, 24 Feb 2020 10:08:17 +0100 Subject: [PATCH] security/vuxml: sync with upstream Taken from: HardenedBSD --- security/vuxml/vuln.xml | 36 +++++++++++++++++++++++++++++++++--- 1 file changed, 33 insertions(+), 3 deletions(-) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 56dade48269..b389187375a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,36 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + WeeChat -- Multiple vulnerabilities + + + weechat + 2.7.1 + + + + +

The WeeChat project reports:

+
+

Buffer overflow when receiving a malformed IRC message 324 (channel + mode). (CVE-2020-8955)

+

Buffer overflow when a new IRC message 005 is received with longer + nick prefixes.

+

Crash when receiving a malformed IRC message 352 (WHO).

+
+ +
+ + https://weechat.org/doc/security/ + CVE-2020-8955 + + + 2020-02-20 + 2020-02-21 + +
+ webkit-gtk3 -- Multiple vulnerabilities @@ -406,7 +436,7 @@ whitespace) ksh93 - 2020.0.1_1,1 + 2020.0.02020.0.1_1,1 ksh93-devel @@ -58887,7 +58917,7 @@ and CVE-2013-0155.

avidemux26 - 0 + 2.6.11
kodi @@ -60758,7 +60788,7 @@ and CVE-2013-0155.

avidemux26 - 0 + 2.6.11
kodi