aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml18
1 files changed, 8 insertions, 10 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index edfa11f3181e..30dbcb7126a2 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -44,17 +44,15 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Author reports:</p>
+ <p>Werner Koch reports:</p>
<blockquote cite="http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html">
- <p>When running GnuPG interactively, special crafted messages may be used
-to crash gpg or gpg2. Running gpg in batch mode, as done by all
-software using gpg as a backend (e.g. mailers), is not affected by
-this bug.
-
-Exploiting this overflow seems to be possible.
-
-gpg-agent, gpgsm, gpgv or other tools from the GnuPG suite are not
-affected.</p>
+ <p>When running GnuPG interactively, special crafted
+ messages may be used to crash gpg or gpg2. Running gpg in
+ batch mode, as done by all software using gpg as a backend
+ (e.g. mailers), is not affected by this bug.</p>
+ <p>Exploiting this overflow seems to be possible.</p>
+ <p>gpg-agent, gpgsm, gpgv or other tools from the GnuPG
+ suite are not affected.</p>
</blockquote>
</body>
</description>