Lines 51-56
Link Here
|
51 |
|
51 |
|
52 |
--> |
52 |
--> |
53 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
53 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
|
|
54 |
<vuln vid="abad20bf-c1b4-11e3-a5ac-001b21614864"> |
55 |
<topic>OpenLDAP -- incorrect handling of NULL in certificate Common Name</topic> |
56 |
<affects> |
57 |
<package> |
58 |
<name>openldap24-client</name> |
59 |
<name>linux-f10-openldap</name> |
60 |
<range><lt>2.4.18</lt></range> |
61 |
</package> |
62 |
</affects> |
63 |
<description> |
64 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
65 |
<p>Jan Lieskovsky reports:</p> |
66 |
<blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-3767"> |
67 |
<p>OpenLDAP does not properly handle a '\0' character in a domain name |
68 |
in the subject's Common Name (CN) field of an X.509 certificate, |
69 |
which allows man-in-the-middle attackers to spoof arbitrary SSL |
70 |
servers via a crafted certificate issued by a legitimate |
71 |
Certification Authority</p> |
72 |
</blockquote> |
73 |
</body> |
74 |
</description> |
75 |
<references> |
76 |
<cvename>CVE-2009-3767</cvename> |
77 |
<url>https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-3767</url> |
78 |
</references> |
79 |
<dates> |
80 |
<discovery>2009-08-07</discovery> |
81 |
<entry>2014-04-11</entry> |
82 |
</dates> |
83 |
</vuln> |
84 |
|
85 |
<vuln vid="9aecb94c-c1ad-11e3-a5ac-001b21614864"> |
86 |
<topic>cURL -- inappropriate GSSAPI delegation</topic> |
87 |
<affects> |
88 |
<package> |
89 |
<name>curl</name> |
90 |
<name>linux-f10-curl</name> |
91 |
<range><ge>7.10.6</ge><le>7.21.6</le></range> |
92 |
</package> |
93 |
</affects> |
94 |
<description> |
95 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
96 |
<p>cURL reports:</p> |
97 |
<blockquote cite="http://curl.haxx.se/docs/adv_20110623.html"> |
98 |
<p>When doing GSSAPI authentication, libcurl unconditionally performs |
99 |
credential delegation. This hands the server a copy of the client's |
100 |
security credentials, allowing the server to impersonate the client |
101 |
to any other using the same GSSAPI mechanism.</p> |
102 |
</blockquote> |
103 |
</body> |
104 |
</description> |
105 |
<references> |
106 |
<cvename>CVE-2011-2192</cvename> |
107 |
<url>http://curl.haxx.se/docs/adv_20110623.html</url> |
108 |
</references> |
109 |
<dates> |
110 |
<discovery>2011-06-23</discovery> |
111 |
<entry>2014-04-11</entry> |
112 |
</dates> |
113 |
</vuln> |
114 |
|
115 |
<vuln vid="77bb0541-c1aa-11e3-a5ac-001b21614864"> |
116 |
<topic>dbus-glib -- privledge escalation</topic> |
117 |
<affects> |
118 |
<package> |
119 |
<name>dbus-glib</name> |
120 |
<name>linux-f10-dbus-glib</name> |
121 |
<range><lt>0.100.1</lt></range> |
122 |
</package> |
123 |
</affects> |
124 |
<description> |
125 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
126 |
<p>Sebastian Krahmer reports:</p> |
127 |
<blockquote cite="https://bugs.freedesktop.org/show_bug.cgi?id=60916"> |
128 |
<p>A privilege escalation flaw was found in the way dbus-glib, the |
129 |
D-Bus add-on library to integrate the standard D-Bus library with |
130 |
the GLib thread abstraction and main loop, performed filtering of |
131 |
the message sender (message source subject), when the |
132 |
NameOwnerChanged signal was received. A local attacker could use |
133 |
this flaw to escalate their privileges.</p> |
134 |
</blockquote> |
135 |
</body> |
136 |
</description> |
137 |
<references> |
138 |
<cvename>CVE-2013-0292</cvename> |
139 |
<url>https://bugs.freedesktop.org/show_bug.cgi?id=60916</url> |
140 |
</references> |
141 |
<dates> |
142 |
<discovery>2013-02-15</discovery> |
143 |
<entry>2014-04-11</entry> |
144 |
</dates> |
145 |
</vuln> |
146 |
|
147 |
<vuln vid="bf7912f5-c1a8-11e3-a5ac-001b21614864"> |
148 |
<topic>nas -- multiple vulnerabilities</topic> |
149 |
<affects> |
150 |
<package> |
151 |
<name>nas</name> |
152 |
<name>linux-f10-nas-libs</name> |
153 |
<range><lt>1.9.4</lt></range> |
154 |
</package> |
155 |
</affects> |
156 |
<description> |
157 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
158 |
<p>Hamid Zamani reports:</p> |
159 |
<blockquote cite="http://radscan.com/pipermail/nas/2013-August/001270.html"> |
160 |
<p>multiple security problems (buffer overflows, format string |
161 |
vulnerabilities and missing input sanitising), which could lead to |
162 |
the execution of arbitrary code.</p> |
163 |
</blockquote> |
164 |
</body> |
165 |
</description> |
166 |
<references> |
167 |
<cvename>CVE-2013-4256</cvename> |
168 |
<cvename>CVE-2013-4257</cvename> |
169 |
<cvename>CVE-2013-4258</cvename> |
170 |
<url>http://radscan.com/pipermail/nas/2013-August/001270.html</url> |
171 |
</references> |
172 |
<dates> |
173 |
<discovery>2013-08-07</discovery> |
174 |
<entry>2014-04-11</entry> |
175 |
</dates> |
176 |
</vuln> |
177 |
|
178 |
<vuln vid="09f47c51-c1a6-11e3-a5ac-001b21614864"> |
179 |
<topic>libaudiofile -- heap-based overflow in Microsoft ADPCM compression module</topic> |
180 |
<affects> |
181 |
<package> |
182 |
<name>libaudiofile</name> |
183 |
<name>linux-f10-libaudiofile</name> |
184 |
<range><lt>0.2.7</lt></range> |
185 |
</package> |
186 |
</affects> |
187 |
<description> |
188 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
189 |
<p>Debian reports:</p> |
190 |
<blockquote cite="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510205"> |
191 |
<p>Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile |
192 |
0.2.6 allows context-dependent attackers to cause a denial of service |
193 |
(application crash) or possibly execute arbitrary code via a crafted |
194 |
WAV file.</p> |
195 |
</blockquote> |
196 |
</body> |
197 |
</description> |
198 |
<references> |
199 |
<cvename>CVE-2014-0159</cvename> |
200 |
<url>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510205</url> |
201 |
</references> |
202 |
<dates> |
203 |
<discovery>2008-12-30</discovery> |
204 |
<entry>2014-04-11</entry> |
205 |
</dates> |
206 |
</vuln> |
207 |
|
54 |
<vuln vid="7ccd4def-c1be-11e3-9d09-000c2980a9f3"> |
208 |
<vuln vid="7ccd4def-c1be-11e3-9d09-000c2980a9f3"> |
55 |
<topic>OpenSSL -- Local Information Disclosure</topic> |
209 |
<topic>OpenSSL -- Local Information Disclosure</topic> |
56 |
<affects> |
210 |
<affects> |
Lines 1084-1089
Link Here
|
1084 |
<affects> |
1238 |
<affects> |
1085 |
<package> |
1239 |
<package> |
1086 |
<name>gnutls</name> |
1240 |
<name>gnutls</name> |
|
|
1241 |
<name>linux-f10-gnutls</name> |
1087 |
<range><lt>2.12.23_4</lt></range> |
1242 |
<range><lt>2.12.23_4</lt></range> |
1088 |
</package> |
1243 |
</package> |
1089 |
<package> |
1244 |
<package> |
Lines 4644-4649
Link Here
|
4644 |
<affects> |
4799 |
<affects> |
4645 |
<package> |
4800 |
<package> |
4646 |
<name>libgcrypt</name> |
4801 |
<name>libgcrypt</name> |
|
|
4802 |
<name>linux-f10-libgcrypt</name> |
4647 |
<range><lt>1.5.3</lt></range> |
4803 |
<range><lt>1.5.3</lt></range> |
4648 |
</package> |
4804 |
</package> |
4649 |
</affects> |
4805 |
</affects> |
Lines 4660-4665
Link Here
|
4660 |
</body> |
4816 |
</body> |
4661 |
</description> |
4817 |
</description> |
4662 |
<references> |
4818 |
<references> |
|
|
4819 |
<cvename>CVE-2013-4242</cvename> |
4663 |
<url>http://eprint.iacr.org/2013/448</url> |
4820 |
<url>http://eprint.iacr.org/2013/448</url> |
4664 |
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000329.html</url> |
4821 |
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000329.html</url> |
4665 |
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html</url> |
4822 |
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html</url> |
Lines 17586-17591
Link Here
|
17586 |
<affects> |
17743 |
<affects> |
17587 |
<package> |
17744 |
<package> |
17588 |
<name>libxml2</name> |
17745 |
<name>libxml2</name> |
|
|
17746 |
<name>linux-f10-libxml2</name> |
17589 |
<range><lt>2.7.8_3</lt></range> |
17747 |
<range><lt>2.7.8_3</lt></range> |
17590 |
</package> |
17748 |
</package> |
17591 |
</affects> |
17749 |
</affects> |
Lines 18888-18893
Link Here
|
18888 |
<affects> |
19046 |
<affects> |
18889 |
<package> |
19047 |
<package> |
18890 |
<name>png</name> |
19048 |
<name>png</name> |
|
|
19049 |
<name>linux-f10-png</name> |
18891 |
<range><lt>1.4.11</lt></range> |
19050 |
<range><lt>1.4.11</lt></range> |
18892 |
</package> |
19051 |
</package> |
18893 |
</affects> |
19052 |
</affects> |
Lines 19929-19934
Link Here
|
19929 |
<affects> |
20088 |
<affects> |
19930 |
<package> |
20089 |
<package> |
19931 |
<name>libxml2</name> |
20090 |
<name>libxml2</name> |
|
|
20091 |
<name>linux-f10-libxml2</name> |
19932 |
<range><lt>2.7.8_2</lt></range> |
20092 |
<range><lt>2.7.8_2</lt></range> |
19933 |
</package> |
20093 |
</package> |
19934 |
</affects> |
20094 |
</affects> |
Lines 22706-22711
Link Here
|
22706 |
</package> |
22866 |
</package> |
22707 |
<package> |
22867 |
<package> |
22708 |
<name>libxml2</name> |
22868 |
<name>libxml2</name> |
|
|
22869 |
<name>linux-f10-libxml2</name> |
22709 |
<range><lt>2.7.8</lt></range> |
22870 |
<range><lt>2.7.8</lt></range> |
22710 |
</package> |
22871 |
</package> |
22711 |
</affects> |
22872 |
</affects> |
Lines 32355-32360
Link Here
|
32355 |
</package> |
32516 |
</package> |
32356 |
<package> |
32517 |
<package> |
32357 |
<name>linux-tiff</name> |
32518 |
<name>linux-tiff</name> |
|
|
32519 |
<name>linux-f10-tiff</name> |
32358 |
<range><lt>3.9.4</lt></range> |
32520 |
<range><lt>3.9.4</lt></range> |
32359 |
</package> |
32521 |
</package> |
32360 |
</affects> |
32522 |
</affects> |
Lines 33540-33545
Link Here
|
33540 |
<name>linux-firefox-devel</name> |
33702 |
<name>linux-firefox-devel</name> |
33541 |
<range><lt>3.5.9</lt></range> |
33703 |
<range><lt>3.5.9</lt></range> |
33542 |
</package> |
33704 |
</package> |
|
|
33705 |
<package> |
33706 |
<name>nss</name> |
33707 |
<name>linux-f10-nss</name> |
33708 |
<range><lt>3.12.5</lt></range> |
33709 |
</package> |
33543 |
</affects> |
33710 |
</affects> |
33544 |
<description> |
33711 |
<description> |
33545 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
33712 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
Lines 35069-35074
Link Here
|
35069 |
<affects> |
35236 |
<affects> |
35070 |
<package> |
35237 |
<package> |
35071 |
<name>expat2</name> |
35238 |
<name>expat2</name> |
|
|
35239 |
<name>linux-f10-expat</name> |
35072 |
<range><lt>2.0.1_1</lt></range> |
35240 |
<range><lt>2.0.1_1</lt></range> |
35073 |
</package> |
35241 |
</package> |
35074 |
</affects> |
35242 |
</affects> |