diff options
author | Jun Kuriyama <kuriyama@FreeBSD.org> | 2006-08-02 01:40:25 +0000 |
---|---|---|
committer | Jun Kuriyama <kuriyama@FreeBSD.org> | 2006-08-02 01:40:25 +0000 |
commit | 310fb65a3ec14026e9eb21e1b25edcfde9f60f5c (patch) | |
tree | 77a4ffc2b35edb165c58c33052b137991d5dc403 /security/vuxml/vuln.xml | |
parent | 4fec1103f6a433f66a430541e76640bc421c6de6 (diff) | |
download | ports-310fb65a3ec14026e9eb21e1b25edcfde9f60f5c.tar.gz ports-310fb65a3ec14026e9eb21e1b25edcfde9f60f5c.zip |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 12cee1dd8965..3ad924d21962 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,34 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ed529baa-21c6-11db-b625-02e081235dab"> + <topic>gnupg -- 2 more possible memory allocation attacks</topic> + <affects> + <package> + <name>gnupg</name> + <range><lt>1.4.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Author reports:</p> + <blockquote cite="http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html"> + <p>Fixed 2 more possible memory allocation attacks. They are + similar to the problem we fixed with 1.4.4. This bug can easily + be be exploted for a DoS; remote code execution is not entirely + impossible.</p> + </blockquote> + </body> + </description> + <references> + <url>http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html</url> + </references> + <dates> + <discovery>2006-08-01</discovery> + <entry>2006-08-02</entry> + </dates> + </vuln> + <vuln vid="76562594-1f19-11db-b7d4-0008743bf21a"> <topic>ruby - multiple vulnerabilities</topic> <affects> |