From owner-freebsd-ports-bugs@FreeBSD.ORG Tue Apr 1 19:00:11 2008 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 92D641065675 for ; Tue, 1 Apr 2008 19:00:11 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 6A7E08FC24 for ; Tue, 1 Apr 2008 19:00:07 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.2/8.14.2) with ESMTP id m31J07Pd071202 for ; Tue, 1 Apr 2008 19:00:07 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.2/8.14.1/Submit) id m31J07Af071201; Tue, 1 Apr 2008 19:00:07 GMT (envelope-from gnats) Resent-Date: Tue, 1 Apr 2008 19:00:07 GMT Resent-Message-Id: <200804011900.m31J07Af071201@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Nick Barkas Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4BCF81065673 for ; Tue, 1 Apr 2008 18:52:24 +0000 (UTC) (envelope-from snb@smtp.earth.threerings.net) Received: from smtp.earth.threerings.net (smtp1.earth.threerings.net [64.127.109.108]) by mx1.freebsd.org (Postfix) with ESMTP id 3CD538FC27 for ; Tue, 1 Apr 2008 18:52:24 +0000 (UTC) (envelope-from snb@smtp.earth.threerings.net) Received: by smtp.earth.threerings.net (Postfix, from userid 10038) id D51CC61ED9; Tue, 1 Apr 2008 11:52:23 -0700 (PDT) Message-Id: <20080401185223.D51CC61ED9@smtp.earth.threerings.net> Date: Tue, 1 Apr 2008 11:52:23 -0700 (PDT) From: Nick Barkas To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: Subject: ports/122350: [patch] Add entry for gnupg 1.4.8 and 2.0.8 to security/vuxml. X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Nick Barkas List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Apr 2008 19:00:11 -0000 >Number: 122350 >Category: ports >Synopsis: [patch] Add entry for gnupg 1.4.8 and 2.0.8 to security/vuxml. >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Tue Apr 01 19:00:07 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Nick Barkas >Release: FreeBSD 6.2-RELEASE-p11 i386 >Organization: Three Rings Design >Environment: System: FreeBSD mail1.earth.threerings.net 6.2-RELEASE-p11 FreeBSD 6.2-RELEASE-p11 #0: Wed Feb 13 07:00:04 UTC 2008 root@i386-builder.daemonology.net:/usr/obj/usr/src/sys/SMP i386 >Description: GnuPG versions 1.4.8 and 2.0.8 contain a memory corruption vulnerability. This patch adds a VuXML entry for this vulnerability. >How-To-Repeat: >Fix: --- vuxml.patch begins here --- --- vuln.xml.orig Sun Mar 30 02:18:33 2008 +++ vuln.xml Tue Apr 1 11:46:00 2008 @@ -34,6 +34,42 @@ --> + + gnupg -- memory corruption vulnerability + + + gnupg + 1.4.8 + 2.0.8 + + + + +

SecurityFocus reports:

+
+

GnuPG is prone to a memory-corruption vulnerability.

+

Exploiting this issue may allow remote attackers to crash the + affected application. Attackers may also be able to execute + arbitrary code in the context of the application, but this has not + been confirmed.

+

GnuPG 1.4.8 and 2.0.8 are vulnerable to this issue; previous + versions may also be affected.

+
+ +
+ + 28487 + CVE-2008-1530 + http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000271.html + http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html + https://bugs.g10code.com/gnupg/issue894 + + + 2008-03-19 + 2008-04-01 + +
+ mozilla -- multiple vulnerabilities --- vuxml.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted: