Fri, 30 Aug 2024 19:33:36 -0500
Update the plugins page for the new process
This includes defining the process and providing a template for a new issue to
add new plugins. I did go through and audit `No IRC /WHO` so we had at least
one validated entry.
Testing Done:
Ran `npm run hugo:server` locally and verified the page worked and checked the new links.
Bugs closed: NEST-53
Reviewed at https://reviews.imfreedom.org/r/3450/
--- title: cve-2009-1376-00 date: 2009-05-02T00:00:00.000Z cveNumber: cve-2009-1376 summary: MSN malformed SLP message overflow discoveredBy: Loc VALBON (via TippingPoint's Zero Day Initiative) fixedInRelease: 2.5.6 type: security layout: cve hidden: true --- ### Description The previous fix to [CVE-2008-2927]({{< ref "cve-2008-2927-00" >}}) was deemed incomplete. The size check improperly cast an `uint64` to `size_t` which can cause an integer overflow, rendering the check useless. ### Mitigation The proper variable type is now used when doing size comparison. Additionally, the malformed message is now properly discarded.