www: a0b587b5: Add CVE number for this puppy
markdoliner at pidgin.im
markdoliner at pidgin.im
Tue Sep 8 12:26:07 EDT 2009
-----------------------------------------------------------------
Revision: a0b587b557cc9af1d268529d09aced5ccdcefcb6
Ancestor: 8ed1adb54bf24b494f6545b3bcc7228d90277b79
Author: markdoliner at pidgin.im
Date: 2009-09-08T16:20:12
Branch: im.pidgin.www
URL: http://d.pidgin.im/viewmtn/revision/info/a0b587b557cc9af1d268529d09aced5ccdcefcb6
Modified files:
htdocs/news/security/index.php
ChangeLog:
Add CVE number for this puppy
-------------- next part --------------
============================================================
--- htdocs/news/security/index.php 6285ede42db9d4301fb98a6e7f47b6ad2d0d0976
+++ htdocs/news/security/index.php 15cf48eb2584d87265e603700beb89a1d5c2ef60
@@ -371,7 +371,7 @@ $vulnerabilities = array(
array(
"title" => "Yahoo IM parsing crash",
"date" => "22 August 2009",
- "cve" => "",
+ "cve" => "CVE-2009-3025",
"summary" => "Crash in Yahoo protocol plugin when receiving an IM",
"description" => "Possibly depending on the architecture and/or flags used to compile libpurple, the Yahoo protocol plugin may crash when receiving an IM from any user which contains a URL. The only vulnerable version of libpurple is 2.6.0.",
"fix" => "Correctly parse URLs in incoming Yahoo messages.",
More information about the Commits
mailing list