35e59726bc
"A vulnerability in Weex can be exploited by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system. The vulnerability is caused due to a format string error in the "log_flush()" function when flushing an error log entry that contains format string specifiers to disk. This may be exploited to execute arbitrary code on a user's system via a directory name containing format string specifiers. Successful exploitation requires that the attacker is able to create directories within the user's Weex home directory." http://secunia.com/advisories/17028/ Patch from FreeBSD PR ports/86833.
9 lines
470 B
Text
9 lines
470 B
Text
$NetBSD: distinfo,v 1.4 2005/10/05 13:38:13 salo Exp $
|
|
|
|
SHA1 (weex-2.6.1.tar.gz) = 8613e7c1a1621bbe042d076883f10b330934de5e
|
|
RMD160 (weex-2.6.1.tar.gz) = d286d24d3d87ce78fb5032d50f0d6a0ac2876a04
|
|
Size (weex-2.6.1.tar.gz) = 200858 bytes
|
|
SHA1 (patch-aa) = f8f092150b3556d78ab8ef66070447724c9c118d
|
|
SHA1 (patch-ab) = 49e383c1c766d63b56256afe3293bf473ca63f6f
|
|
SHA1 (patch-ac) = e22d816ad7177fdc3bd68f33fd1118cc8f5164d2
|
|
SHA1 (patch-ad) = 0474aa99d979ff90aa1d9c179e7c44eccceefce2
|