diff options
author | kuriyama <kuriyama@FreeBSD.org> | 2006-08-02 09:40:25 +0800 |
---|---|---|
committer | kuriyama <kuriyama@FreeBSD.org> | 2006-08-02 09:40:25 +0800 |
commit | 99d7608abf1d43ce9c4d2972ab954e4a9eddbab2 (patch) | |
tree | 638ac31389408b8bc05389855343f34b12e8e03c /security | |
parent | dd47c1301664f07a86e2c5262a7d5a637e0295d5 (diff) | |
download | freebsd-ports-gnome-99d7608abf1d43ce9c4d2972ab954e4a9eddbab2.tar.gz freebsd-ports-gnome-99d7608abf1d43ce9c4d2972ab954e4a9eddbab2.tar.zst freebsd-ports-gnome-99d7608abf1d43ce9c4d2972ab954e4a9eddbab2.zip |
Add recent gnupg issue.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 12cee1dd8965..3ad924d21962 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,34 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ed529baa-21c6-11db-b625-02e081235dab"> + <topic>gnupg -- 2 more possible memory allocation attacks</topic> + <affects> + <package> + <name>gnupg</name> + <range><lt>1.4.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Author reports:</p> + <blockquote cite="http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html"> + <p>Fixed 2 more possible memory allocation attacks. They are + similar to the problem we fixed with 1.4.4. This bug can easily + be be exploted for a DoS; remote code execution is not entirely + impossible.</p> + </blockquote> + </body> + </description> + <references> + <url>http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html</url> + </references> + <dates> + <discovery>2006-08-01</discovery> + <entry>2006-08-02</entry> + </dates> + </vuln> + <vuln vid="76562594-1f19-11db-b7d4-0008743bf21a"> <topic>ruby - multiple vulnerabilities</topic> <affects> |