View | Details | Raw Unified | Return to bug 199162 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+27 lines)
Lines 57-62 Link Here
57
57
58
-->
58
-->
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
  <vuln vid="e426eda9-dae1-11e4-8107-94de806b0af9">
61
    <topic>Dulwich -- remote vulnerability</topic>
62
    <affects>
63
      <package>
64
	<name>py27-dulwich</name>
65
	<range><lt>0.9.9</lt></range>
66
      </package>
67
    </affects>
68
    <description>
69
      <body xmlns="http://www.w3.org/1999/xhtml">
70
	<p>The Dulwich Project reports:</p>
71
	<blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0838">
72
	  <p>Buffer overflow in the C implementation of the apply_delta function
73
	  in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute
74
	  arbitrary code via a crafted pack file.</p>
75
	</blockquote>
76
      </body>
77
    </description>
78
    <references>
79
      <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0838</url>
80
    </references>
81
    <dates>
82
      <discovery>2015-01-07</discovery>
83
      <entry>2015-04-04</entry>
84
    </dates>
85
  </vuln>
86
60
  <vuln vid="b8321d76-24e7-4b72-a01d-d12c4445d826">
87
  <vuln vid="b8321d76-24e7-4b72-a01d-d12c4445d826">
61
    <topic>mozilla -- multiple vulnerabilities</topic>
88
    <topic>mozilla -- multiple vulnerabilities</topic>
62
    <affects>
89
    <affects>

Return to bug 199162