diff options
author | Mark Felder <feld@FreeBSD.org> | 2015-09-22 17:20:01 +0000 |
---|---|---|
committer | Mark Felder <feld@FreeBSD.org> | 2015-09-22 17:20:01 +0000 |
commit | f5c377a330ba6d6bee1a25d08ec888e2ed2444c5 (patch) | |
tree | 5e03493ead913b82c05fd194d5abf93dfc27ef1e /security | |
parent | e2c4d7515945acb389887c9f62213aadbba6e8b4 (diff) | |
download | ports-f5c377a330ba6d6bee1a25d08ec888e2ed2444c5.tar.gz ports-f5c377a330ba6d6bee1a25d08ec888e2ed2444c5.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 96c3ff370de7..665dd291be1e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,36 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="9770d6ac-614d-11e5-b379-14dae9d210b8"> + <topic>libssh2 -- denial of service vulnerability</topic> + <affects> + <package> + <name>libssh2</name> + <range><lt>1.5.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mariusz Ziulek reports:</p> + <blockquote cite="http://www.libssh2.org/adv_20150311.html"> + <p>A malicious attacker could man in the middle a real server + and cause libssh2 using clients to crash (denial of service) or + otherwise read and use completely unintended memory areas in this + process.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.libssh2.org/adv_20150311.html</url> + <url>https://trac.libssh2.org/ticket/294</url> + <cvename>CVE-2015-1782</cvename> + </references> + <dates> + <discovery>2015-01-25</discovery> + <entry>2015-09-22</entry> + </dates> + </vuln> + <vuln vid="2d56c7f4-b354-428f-8f48-38150c607a05"> <topic>mozilla -- multiple vulnerabilities</topic> <affects> |