summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJason E. Hale <jhale@FreeBSD.org>2014-08-02 02:34:44 +0000
committerJason E. Hale <jhale@FreeBSD.org>2014-08-02 02:34:44 +0000
commita41405ac06840c104bebccf6770812c66a0824b2 (patch)
treec4db736bd028dceca47a0eedd383702d3d1c13eb
parent- Update from 1.89.2 to 1.90.0 (diff)
- Document vulnerability in security/gpgme (CVE-2014-3564)
-rw-r--r--security/vuxml/vuln.xml27
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e3ef8aae845c..f502b4c4d46e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,33 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="90ca3ba5-19e6-11e4-8616-001b3856973b">
+ <topic>gpgme -- heap-based buffer overflow in gpgsm status handler</topic>
+ <affects>
+ <package>
+ <name>gpgme</name>
+ <range><lt>1.5.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Tomas Trnka reports:</p>
+ <blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=1113267">
+ <p>Gpgme contains a buffer overflow in the gpgsm status handler
+ that could possibly be exploited using a specially crafted certificate.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-3564</cvename>
+ <url>https://bugzilla.redhat.com/show_bug.cgi?id=1113267</url>
+ </references>
+ <dates>
+ <discovery>2014-06-25</discovery>
+ <entry>2014-08-02</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2f90556f-18c6-11e4-9cc4-5453ed2e2b49">
<topic>kdelibs -- KAuth PID Reuse Flaw</topic>
<affects>