aboutsummaryrefslogtreecommitdiffstats
path: root/security/portaudit-db
diff options
context:
space:
mode:
authoreik <eik@FreeBSD.org>2004-07-11 20:09:03 +0800
committereik <eik@FreeBSD.org>2004-07-11 20:09:03 +0800
commitdfbf97ffeeeeaad8ca007cbaf08c2d409a5c5a83 (patch)
tree279f447b88c5dee4af4bd4d93034b4ed4a3f3598 /security/portaudit-db
parent963ed66ec0a5f2c5b3a59fda1a4d97347a7af2ff (diff)
downloadfreebsd-ports-gnome-dfbf97ffeeeeaad8ca007cbaf08c2d409a5c5a83.tar.gz
freebsd-ports-gnome-dfbf97ffeeeeaad8ca007cbaf08c2d409a5c5a83.tar.zst
freebsd-ports-gnome-dfbf97ffeeeeaad8ca007cbaf08c2d409a5c5a83.zip
correct vulnerable version of linux-png and add a reference
Diffstat (limited to 'security/portaudit-db')
-rw-r--r--security/portaudit-db/database/portaudit.txt4
1 files changed, 2 insertions, 2 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index 1a4d874d6a45..2341f5aafc08 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -36,5 +36,5 @@ libxine<1.0.r4|http://www.xinehq.de/index.php/security/XSA-2004-3 http://cve.mit
apache>=2.*<2.0.49_3|http://www.guninski.com/httpd1.html http://www.apacheweek.com/features/security-20 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493 http://secunia.com/advisories/11956 http://www.osvdb.org/7269|Apache input header folding DoS vulnerability|81a8c9c2-c94f-11d8-8898-000d6111a684
isakmpd<20040611|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022399.html http://www.osvdb.org/6951 http://www.secunia.com/advisories/11827 http://www.securityfocus.com/bid/10496|isakmpd security association deletion vulnerability|9a73a5b4-c9b5-11d8-95ca-02e081301d81
krb5<1.3.4|http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0523 http://www.osvdb.org/6846 http://secunia.com/advisories/11753 http://www.kb.cert.org/vuls/id/686862 http://www.securityfocus.com/bid/10448|MIT Kerberos 5 krb5_aname_to_localname() buffer overflow|5177b6e5-c9b7-11d8-95ca-02e081301d81
-png<1.2.5_6|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363 http://www.osvdb.org/7191 http://www.securityfocus.com/bid/6431|libpng row buffer overflow|1b78d43f-d32b-11d8-b479-02e0185c0b53
-linux-png<1.2.5|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363 http://www.osvdb.org/7191 http://www.securityfocus.com/bid/6431|libpng row buffer overflow|1b78d43f-d32b-11d8-b479-02e0185c0b53
+png<1.2.5_6|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363 http://rhn.redhat.com/errata/RHSA-2003-006.html http://www.osvdb.org/7191 http://www.securityfocus.com/bid/6431|libpng row buffer overflow|1b78d43f-d32b-11d8-b479-02e0185c0b53
+linux-png<1.0.14_3|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363 http://rhn.redhat.com/errata/RHSA-2003-006.html http://www.osvdb.org/7191 http://www.securityfocus.com/bid/6431|libpng row buffer overflow|1b78d43f-d32b-11d8-b479-02e0185c0b53