Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=52d9770d9f018d085754ba358739e48d06051c81
commit 52d9770d9f018d085754ba358739e48d06051c81 Author: kikadf <[email protected]> Date: Wed Aug 20 11:17:30 2014 +0200 Add FSA for gpgme diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 14c8bb1..6e8a58b 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -39,6 +39,17 @@ <fsas> <fsa> + <id>871</id> + <date>2014-08-20</date> + <author>kikadf</author> + <package>gpgme</package> + <vulnerable>1.3.1-5</vulnerable> + <unaffected>1.3.1-6arcturus1</unaffected> + <bts></bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564</cve> + <desc>Tomáš Trnka discovered a heap-based buffer overflow within the gpgsm status handler of GPGME, a library designed to make access to GnuPG easier for applications. An attacker could use this issue to cause an application using GPGME to crash (denial of service) or possibly to execute arbitrary code.</desc> + </fsa> + <fsa> <id>870</id> <date>2014-08-20</date> <author>kikadf</author>
_______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
