summaryrefslogtreecommitdiff
path: root/chat/xchat-perl
diff options
context:
space:
mode:
authorwiz <wiz@pkgsrc.org>2015-12-09 13:54:32 +0000
committerwiz <wiz@pkgsrc.org>2015-12-09 13:54:32 +0000
commitf059715d6b0cad9586a6ab6914d4e9917de5c72f (patch)
tree5d42388227da11d0577c8f91e1d3bff12fa1b0ea /chat/xchat-perl
parentaf26e89c1257a534acbcf39042ad23255e2e999d (diff)
downloadpkgsrc-f059715d6b0cad9586a6ab6914d4e9917de5c72f.tar.gz
Update keepassx to 0.4.4.
Non-Windows CVE mentioned below was already fixed in pkgsrc. Changes: Two security flaws have been discovered in KeePassX 0.4.3. Version 2.0 has a different codebase and is not affected. * CVE-2015-8359: DLL Preloading vulnerability on Windows The version of Qt bundled with KeePassX 0.4.3 is vulnerable to a DDL preloading attack. This vulnerability only affects KeePassX on Windows. If successfully exploited, arbitrary code can be executed in the context of KeePassX. KeePassX 0.4.4 ships with Qt 4.8.7 and employs additional hardening measures. Thanks to Trenton Ivey from SecureWorks for reporting this vulnerability to us. * CVE-2015-8378: Canceling XML export function creates export as ".xml"Ć¢file When canceling the "Export to > KeePassX XML file" function the cleartext passwords were still exported. In this case the password database was exported as the file ".xml" in the current working directory (often $HOME or the directory of the database). Originally reported as Debian bug #791858 KeePassX 0.4.4 fixes both vulnerabilities.
Diffstat (limited to 'chat/xchat-perl')
0 files changed, 0 insertions, 0 deletions