summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorMANTANI Nobutaka <nobutaka@FreeBSD.org>2005-10-01 16:43:38 +0000
committerMANTANI Nobutaka <nobutaka@FreeBSD.org>2005-10-01 16:43:38 +0000
commit3be9e2b847a422fc53272e16a572496d86855cfa (patch)
tree19af0180ef2586dd3e52b75129f1603182ac65ee /security
parentDocument japanese/uim privilege escalation vulnerability. (diff)
Add an URL to the entry of the japanese/uim.
Notes
Notes: svn path=/head/; revision=143911
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d6ff4a47c0e3..1ad3add10e3d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -45,7 +45,7 @@ Note: Please add new entries to the beginning of this file.
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The uim developers reports:</p>
- <blockquote cite="INSERT URL HERE">
+ <blockquote cite="http://lists.freedesktop.org/archives/uim/2005-September/001346.html">
<p>Masanari Yamamoto discovered that incorrect use
of environment variables in uim. This bug causes
privilege escalation if setuid/setgid applications