View | Details | Raw Unified | Return to bug 204044 | Differences between
and this patch

Collapse All | Expand All

(-)b/security/vuxml/vuln.xml (+26 lines)
Lines 58-63 Notes: Link Here
58
58
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="2a4a112a-7c1b-11e5-bd77-0800275369e2">
62
    <topic>lldpd -- Buffer overflow</topic>
63
    <affects>
64
      <package>
65
	<name>lldpd</name>
66
	<range><ge>0.5.6</ge><lt>0.7.19</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>The lldpd developer Vincent Bernat reports:</p>
72
	<blockquote cite="https://github.com/vincentbernat/lldpd/raw/0.7.19/NEWS">
73
	  <p>A buffer overflow may allow arbitrary code execution
74
            only if hardening was disabled.</p>
75
	</blockquote>
76
      </body>
77
    </description>
78
    <references>
79
      <url>https://github.com/vincentbernat/lldpd/raw/0.7.19/NEWS</url>
80
    </references>
81
    <dates>
82
      <discovery>2015-10-04</discovery>
83
      <entry>2015-10-26</entry>
84
    </dates>
85
  </vuln>
86
61
  <vuln vid="24e4d383-7b3e-11e5-a250-68b599b52a02">
87
  <vuln vid="24e4d383-7b3e-11e5-a250-68b599b52a02">
62
    <topic>wireshark -- Pcapng file parser crash</topic>
88
    <topic>wireshark -- Pcapng file parser crash</topic>
63
    <affects>
89
    <affects>

Return to bug 204044