kde-playground/kdepimlibs/syndication/tests/rdf/security_debian.rdf.xml
2015-04-14 21:49:29 +00:00

38 lines
1.3 KiB
XML

<?xml version="1.0" encoding="iso-8859-1"?>
<?xml-stylesheet href="dsa-rdf.css" type="text/css"?>
<rdf:RDF
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns="http://purl.org/rss/1.0/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xml:lang="en"
>
<!-- source: http://security.debian.org/
properties:
- description: escaped HTML
- dc:date: short date-only version
-->
<channel rdf:about="http://www.debian.org/security/dsa.rdf">
<title>Debian Security</title>
<link>http://security.debian.org/</link>
<description>
Debian Security Advisories
</description>
<dc:date>2006-03-18T02:46:35+00:00</dc:date>
<items>
<rdf:Seq>
<rdf:li resource="http://www.debian.org/security/2006/dsa-1008" />
</rdf:Seq>
</items>
</channel>
<item rdf:about="http://www.debian.org/security/2006/dsa-1008">
<title>DSA-1008 kdegraphics - buffer overflow</title>
<link>http://www.debian.org/security/2006/dsa-1008</link>
<description>
&lt;p&gt;Marcelo Ricardo Leitner noticed that the current patch in DSA 932
(&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627&quot;&gt;CVE-2005-3627&lt;/a&gt;) for kpdf, the PDF viewer for KDE, does not fix all
buffer overflows, still allowing an attacker to execute arbitrary
code.&lt;/p&gt;
</description>
<dc:date>2006-03-17</dc:date>
</item>
</rdf:RDF>