openbsd-ports/editors/xemacs21/patches
brad e296bee697 Max Vozeler discovered a format string vulnerability in the "movemail"
utility of Emacs. By sending specially crafted packets, a malicious
POP3 server could cause a buffer overflow, which could have been
exploited to execute arbitrary code with the privileges of the user.
2005-02-09 03:48:43 +00:00
..
patch-configure_in don't rely on inter-library dependency; from aleksander.piotrowski@nic.com.pl 2004-10-04 16:40:48 +00:00
patch-lib-src_gnuserv_h update to xemacs 21.4.15 2004-06-24 17:21:49 +00:00
patch-lib-src_gnuslib_c update to xemacs 21.4.15 2004-06-24 17:21:49 +00:00
patch-lib-src_Makefile_in_in update editors/xemacs to 21.4.12; from MAINTAINER; reviewed by me and sturm@ 2003-04-24 18:15:39 +00:00
patch-lib-src_movemail_c Max Vozeler discovered a format string vulnerability in the "movemail" 2005-02-09 03:48:43 +00:00
patch-lisp_find-paths_el update editors/xemacs to 21.4.12; from MAINTAINER; reviewed by me and sturm@ 2003-04-24 18:15:39 +00:00
patch-Makefile_in_in update editors/xemacs to 21.4.12; from MAINTAINER; reviewed by me and sturm@ 2003-04-24 18:15:39 +00:00
patch-src_dumper_c update editors/xemacs to 21.4.12; from MAINTAINER; reviewed by me and sturm@ 2003-04-24 18:15:39 +00:00
patch-src_editfns_c update editors/xemacs to 21.4.12; from MAINTAINER; reviewed by me and sturm@ 2003-04-24 18:15:39 +00:00
patch-src_Makefile_in_in update editors/xemacs to 21.4.12; from MAINTAINER; reviewed by me and sturm@ 2003-04-24 18:15:39 +00:00