mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-16 09:26:58 +02:00
Merge pull request #210 from kinvolk/dongsu/glsa-update-20210903
metadata: update GLSA metadata 2021-09-03
This commit is contained in:
commit
4dabf80812
@ -1,23 +1,23 @@
|
||||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA512
|
||||
|
||||
MANIFEST Manifest.files.gz 465570 BLAKE2B a62e99817e32fd8ff7f82db3f63ecd455d8d078254d12926bca9349cd7d4cb7525d19b5ca213653d7ca3a28e5f51b7e4f978944f6a7c39fec3994650ada13ff2 SHA512 ee24891578ae08c29634185ea42adbf62dff9fd502bd411c413a0b0088f0d305dd4dba72180ac6793f6d434a7cc1a30d883831d3d40443eae468994ac283a7ef
|
||||
TIMESTAMP 2020-05-15T14:08:26Z
|
||||
MANIFEST Manifest.files.gz 517807 BLAKE2B 2ecdb63e9cfe1a1b71d23ab4fe58b057928be5a410ab9012b87ec1e7c917af227099229248e5b2c7dc5b25edb96e4adad920259d956349d0ecbb204178f8da2c SHA512 4ca9cc06a8ae7d4eefdd8a435b92f1f4e675295b618afdb11cf1d7f45b49f0fd5137f7f0c81b60933a8b942fe25de9928a9f4ffe0d5968bae8eae39c95a7da50
|
||||
TIMESTAMP 2021-09-03T09:39:09Z
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl6+olpfFIAAAAAALgAo
|
||||
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmEx7T1fFIAAAAAALgAo
|
||||
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
|
||||
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
|
||||
klBInA//UsEYg3X87qjYposFYkbACD9iS4i63RKctLCgMXD3wNQLH2hP6A3CmAQT
|
||||
rEuWnPDuWyWJ7NX7RlWWO0IsNn6lcy628Aw/h4fpM8t0NvtmnZflyt1tXznmez/i
|
||||
0Ws4eyP86Kygz+wBfLWeqc+rKY2GHcB+BtY99SxZ9dr9XoK8/DaLbpN7Af1ljkmK
|
||||
pdLRKW04PMMUVAoLTolqK5C2SoveY/AkjH6MA4+oKuaQtTQVCjnfgB3O8RumrdBK
|
||||
WdWPyDR2W45Bp0a25pFcBcIb8KQdbKk8Rr3c/7rpae7UUG62aKzHo6Ej1d5Ih81B
|
||||
FWtN2cKeUKSrI5FY8oZnZGVfhzJjKGkTwYm6SsNJ9Oa01/Lt/Vb5RBRgozhdVUdj
|
||||
3zihSZ+2h3JJlo/FGLUnqFK8oihZ21wPdztkWre5moVaQ3gg9DIOSl6w5+MT7gqc
|
||||
X6qkpkAOxxsKz/EiVJHPqtdzEAwLAGK15qoaiKxoHFHqGDrPjTyWA+qcrZmUo9l8
|
||||
MfJ1KPMT+O9uWaOaA4Pnp2enS13q2XpzcoRcsYBKomFezDBOjuZ/Yrq3Cr21ABp+
|
||||
rxdlMO1tV0C992S7W9KxEZGHYNaP0kUkIR/jtLWsaTabVqiSJe6IZGsypr8SbEiU
|
||||
wISVxlE6KbWGSJmaP/F7e7MnBckTOrLB0vx41r/9+kZbR1whfRQ=
|
||||
=VfoR
|
||||
klDDdg/9E3xzbHQflhxbmbSuYxUQw+5moNxqX0RH7/BlcY/jtIzF4trigK8Sq+eQ
|
||||
zawPG+Z46e42+9llPtTeJ/S9fThrYfbJ2F8bw3QlQT6bdwOsi+Gm0x2taeLJM42L
|
||||
5TQUDlSsB9V0Q41nNpqBn4KKrz7KeSd0B6EFOtgyjIivAR6IiDpn6t8XHHQUAcDt
|
||||
MqeWOU1AuDvR3spVwNIXiC3nX8hn9LnPk2F/N3tmxAT1IctmW0mZtNxhlbEa48Le
|
||||
h/ESWkPqsPno/OGGby+qsXyS1+29LFq4dYin+zl9qOdFoqJ/FcbpYYajz7Kg4fT+
|
||||
Rt71hIBC9e6N4Vruyj4TGp1UyuQ95W8ff0fuuUGV02dsGZCgN1qdW8RD6x+LtAGn
|
||||
ee5tLam28eFy6n2M3ACaKdgGfUCQs5UozjR9/KjGjf5ZzMt1O0DYOkGK3lOx90jJ
|
||||
9R04NMl4lN6NqyzqEn0Gr6ljMyjhXP2VYaqQqtu0ybAezVenIV+xXw99WuA0IUYJ
|
||||
KEzFaKCB/D4tj6IidGvz3/Zk+Asa1+VxlZ3GoT9jkG4E93doQQk7mcWpulADxYwI
|
||||
1VYd/u/8ud8LLe6Yq61DZRnoAIyQJYhX8Ij2d54uD+G1vz/Oa+o0nk3yCcJl/Pjj
|
||||
A1vjJG4Be5NsoFJUVQaxiNcfN0KxGx6Z5RPgGMYlGhkSIjsw56U=
|
||||
=plvA
|
||||
-----END PGP SIGNATURE-----
|
||||
|
Binary file not shown.
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200503-22">
|
||||
<title>KDE: Local Denial of Service</title>
|
||||
<title>KDE: Local Denial of service</title>
|
||||
<synopsis>
|
||||
KDE is vulnerable to a local Denial of Service attack.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200503-33">
|
||||
<title>IPsec-Tools: racoon Denial of Service</title>
|
||||
<title>IPsec-Tools: racoon Denial of service</title>
|
||||
<synopsis>
|
||||
IPsec-Tools' racoon is affected by a remote Denial of Service vulnerability.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200601-16">
|
||||
<title>MyDNS: Denial of Service</title>
|
||||
<title>MyDNS: Denial of service</title>
|
||||
<synopsis>
|
||||
MyDNS contains a vulnerability that may lead to a Denial of Service attack.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200603-11">
|
||||
<title>Freeciv: Denial of Service</title>
|
||||
<title>Freeciv: Denial of service</title>
|
||||
<synopsis>
|
||||
A memory allocation bug in Freeciv allows a remote attacker to perform a
|
||||
Denial of Service attack.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200604-09">
|
||||
<title>Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service</title>
|
||||
<title>Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of service</title>
|
||||
<synopsis>
|
||||
Cyrus-SASL contains a vulnerability in the DIGEST-MD5 process that could
|
||||
lead to a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200605-11">
|
||||
<title>Ruby: Denial of Service</title>
|
||||
<title>Ruby: Denial of service</title>
|
||||
<synopsis>
|
||||
Ruby WEBrick and XMLRPC servers are vulnerable to Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200606-11">
|
||||
<title>JPEG library: Denial of Service</title>
|
||||
<title>JPEG library: Denial of service</title>
|
||||
<synopsis>
|
||||
The JPEG library is vulnerable to a Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200606-19">
|
||||
<title>Sendmail: Denial of Service</title>
|
||||
<title>Sendmail: Denial of service</title>
|
||||
<synopsis>
|
||||
Faulty multipart MIME messages can cause forked Sendmail processes to
|
||||
crash.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200606-26">
|
||||
<title>EnergyMech: Denial of Service</title>
|
||||
<title>EnergyMech: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability was discovered in EnergyMech that is
|
||||
easily exploitable via IRC.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200608-09">
|
||||
<title>MySQL: Denial of Service</title>
|
||||
<title>MySQL: Denial of service</title>
|
||||
<synopsis>
|
||||
An authenticated user can crash MySQL through invalid parameters to the
|
||||
date_format function.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200608-23">
|
||||
<title>Heartbeat: Denial of Service</title>
|
||||
<title>Heartbeat: Denial of service</title>
|
||||
<synopsis>
|
||||
Heartbeat is vulnerable to a Denial of Service which can be triggered by a
|
||||
remote attacker without authentication.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200609-03">
|
||||
<title>OpenTTD: Remote Denial of Service</title>
|
||||
<title>OpenTTD: Remote Denial of service</title>
|
||||
<synopsis>
|
||||
The OpenTTD server is vulnerable to a remote Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200609-11">
|
||||
<title>BIND: Denial of Service</title>
|
||||
<title>BIND: Denial of service</title>
|
||||
<synopsis>
|
||||
ISC BIND contains two vulnerabilities allowing a Denial of Service under
|
||||
certain conditions.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200609-17">
|
||||
<title>OpenSSH: Denial of Service</title>
|
||||
<title>OpenSSH: Denial of service</title>
|
||||
<synopsis>
|
||||
A flaw in the OpenSSH daemon allows remote unauthenticated attackers to
|
||||
cause a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200609-20">
|
||||
<title>DokuWiki: Shell command injection and Denial of Service</title>
|
||||
<title>DokuWiki: Shell command injection and Denial of service</title>
|
||||
<synopsis>
|
||||
DokuWiki is vulnerable to shell command injection and Denial of Service
|
||||
attacks when using ImageMagick.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200611-09">
|
||||
<title>libpng: Denial of Service</title>
|
||||
<title>libpng: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability in libpng may allow a remote attacker to crash applications
|
||||
that handle untrusted images.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200612-18">
|
||||
<title>ClamAV: Denial of Service</title>
|
||||
<title>ClamAV: Denial of service</title>
|
||||
<synopsis>
|
||||
ClamAV is vulnerable to Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200701-01">
|
||||
<title>DenyHosts: Denial of Service</title>
|
||||
<title>DenyHosts: Denial of service</title>
|
||||
<synopsis>
|
||||
DenyHosts does not correctly parse log entries, potentially causing a
|
||||
remote Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200701-05">
|
||||
<title>KDE kfile JPEG info plugin: Denial of Service</title>
|
||||
<title>KDE kfile JPEG info plugin: Denial of service</title>
|
||||
<synopsis>
|
||||
The KDE kfile JPEG info plugin of kdegraphics could enter an endless loop
|
||||
leading to a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200701-09">
|
||||
<title>oftpd: Denial of Service</title>
|
||||
<title>oftpd: Denial of service</title>
|
||||
<synopsis>
|
||||
An assertion in oftpd could lead to a denial of service vulnerability.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200701-14">
|
||||
<title>Mod_auth_kerb: Denial of Service</title>
|
||||
<title>Mod_auth_kerb: Denial of service</title>
|
||||
<synopsis>
|
||||
Mod_auth_kerb is vulnerable to a buffer overflow possibly allowing a Denial
|
||||
of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200702-03">
|
||||
<title>Snort: Denial of Service</title>
|
||||
<title>Snort: Denial of service</title>
|
||||
<synopsis>
|
||||
Snort contains a vulnerability in the rule matching algorithm that could
|
||||
result in a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200702-05">
|
||||
<title>Fail2ban: Denial of Service</title>
|
||||
<title>Fail2ban: Denial of service</title>
|
||||
<synopsis>
|
||||
A flaw in Fail2ban may allow remote attackers to deny access to arbitrary
|
||||
hosts.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200702-06">
|
||||
<title>BIND: Denial of Service</title>
|
||||
<title>BIND: Denial of service</title>
|
||||
<synopsis>
|
||||
ISC BIND contains two vulnerabilities allowing a Denial of Service under
|
||||
certain conditions.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200703-02">
|
||||
<title>SpamAssassin: Long URI Denial of Service</title>
|
||||
<title>SpamAssassin: Long URI Denial of service</title>
|
||||
<synopsis>
|
||||
SpamAssassin is vulnerable to a Denial of Service attack.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200703-03">
|
||||
<title>ClamAV: Denial of Service</title>
|
||||
<title>ClamAV: Denial of service</title>
|
||||
<synopsis>
|
||||
ClamAV contains two vulnerabilities allowing a Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200703-12">
|
||||
<title>SILC Server: Denial of Service</title>
|
||||
<title>SILC Server: Denial of service</title>
|
||||
<synopsis>
|
||||
SILC Server is affected by a Denial of Service vulnerability.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200703-14">
|
||||
<title>Asterisk: SIP Denial of Service</title>
|
||||
<title>Asterisk: SIP Denial of service</title>
|
||||
<synopsis>
|
||||
Asterisk is vulnerable to Denial of Service in the SIP channel.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200703-27">
|
||||
<title>Squid: Denial of Service</title>
|
||||
<title>Squid: Denial of service</title>
|
||||
<synopsis>
|
||||
Squid is affected by a Denial of Service vulnerability.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200703-28">
|
||||
<title>CUPS: Denial of Service</title>
|
||||
<title>CUPS: Denial of service</title>
|
||||
<synopsis>
|
||||
CUPS incorrectly handles partially-negotiated SSL connections allowing for
|
||||
a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200704-11">
|
||||
<title>Vixie Cron: Denial of Service</title>
|
||||
<title>Vixie Cron: Denial of service</title>
|
||||
<synopsis>
|
||||
The Gentoo implementation of Vixie Cron is vulnerable to a local Denial of
|
||||
Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200704-13">
|
||||
<title>File: Denial of Service</title>
|
||||
<title>File: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability has been discovered in file allowing for a denial of
|
||||
service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200704-14">
|
||||
<title>FreeRADIUS: Denial of Service</title>
|
||||
<title>FreeRADIUS: Denial of service</title>
|
||||
<synopsis>
|
||||
A memory leak has been discovered in FreeRADIUS, possibly allowing for a
|
||||
Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200704-22">
|
||||
<title>BEAST: Denial of Service</title>
|
||||
<title>BEAST: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability has been discovered in BEAST allowing for a Denial of
|
||||
Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200705-04">
|
||||
<title>Apache mod_perl: Denial of Service</title>
|
||||
<title>Apache mod_perl: Denial of service</title>
|
||||
<synopsis>
|
||||
The mod_perl Apache module is vulnerable to a Denial of Service when
|
||||
processing regular expressions.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200705-05">
|
||||
<title>Quagga: Denial of Service</title>
|
||||
<title>Quagga: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability has been discovered in Quagga allowing for a Denial of
|
||||
Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200705-09">
|
||||
<title>IPsec-Tools: Denial of Service</title>
|
||||
<title>IPsec-Tools: Denial of service</title>
|
||||
<synopsis>
|
||||
IPsec-Tools contains a vulnerability that allows a remote attacker to crash
|
||||
the IPsec tunnel.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200705-24">
|
||||
<title>libpng: Denial of Service</title>
|
||||
<title>libpng: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability in libpng may allow a remote attacker to crash applications
|
||||
that handle untrusted images.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200707-13">
|
||||
<title>Fail2ban: Denial of Service</title>
|
||||
<title>Fail2ban: Denial of service</title>
|
||||
<synopsis>
|
||||
Fail2ban is vulnerable to a Denial of Service attack.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200708-04">
|
||||
<title>ClamAV: Denial of Service</title>
|
||||
<title>ClamAV: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability has been discovered in ClamAV, allowing for a Denial of
|
||||
Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200708-14">
|
||||
<title>NVIDIA drivers: Denial of Service</title>
|
||||
<title>NVIDIA drivers: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability has been discovered in the NVIDIA graphic drivers, allowing
|
||||
for a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200709-11">
|
||||
<title>GDM: Local Denial of Service</title>
|
||||
<title>GDM: Local Denial of service</title>
|
||||
<synopsis>
|
||||
GDM can be crashed by a local user, preventing it from managing future
|
||||
displays.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200710-14">
|
||||
<title>DenyHosts: Denial of Service</title>
|
||||
<title>DenyHosts: Denial of service</title>
|
||||
<synopsis>
|
||||
DenyHosts does not correctly parse log entries, potentially causing a
|
||||
remote Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200711-09">
|
||||
<title>MadWifi: Denial of Service</title>
|
||||
<title>MadWifi: Denial of service</title>
|
||||
<synopsis>
|
||||
MadWifi does not correctly process beacon frames which can lead to a
|
||||
remotely triggered Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200711-13">
|
||||
<title>3proxy: Denial of Service</title>
|
||||
<title>3proxy: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability has been discovered in 3proxy, possibly resulting in a
|
||||
Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200711-25">
|
||||
<title>MySQL: Denial of Service</title>
|
||||
<title>MySQL: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability was found in MySQL.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200711-31">
|
||||
<title>Net-SNMP: Denial of Service</title>
|
||||
<title>Net-SNMP: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability has been discovered in Net-SNMP when
|
||||
processing GETBULK requests.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200712-12">
|
||||
<title>IRC Services: Denial of Service</title>
|
||||
<title>IRC Services: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability has been reported in IRC Services.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200712-19">
|
||||
<title>Syslog-ng: Denial of Service</title>
|
||||
<title>Syslog-ng: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability has been discovered in Syslog-ng.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200801-04">
|
||||
<title>OpenAFS: Denial of Service</title>
|
||||
<title>OpenAFS: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability has been discovered in OpenAFS.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200801-05">
|
||||
<title>Squid: Denial of Service</title>
|
||||
<title>Squid: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability has been reported in Squid.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200801-13">
|
||||
<title>ngIRCd: Denial of Service</title>
|
||||
<title>ngIRCd: Denial of service</title>
|
||||
<synopsis>
|
||||
ngIRCd does not properly sanitize commands sent by users, allowing for a
|
||||
Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200801-16">
|
||||
<title>MaraDNS: CNAME Denial of Service</title>
|
||||
<title>MaraDNS: CNAME Denial of service</title>
|
||||
<synopsis>
|
||||
MaraDNS is prone to a Denial of Service vulnerability impacting CNAME
|
||||
resolution.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200801-17">
|
||||
<title>Netkit FTP Server: Denial of Service</title>
|
||||
<title>Netkit FTP Server: Denial of service</title>
|
||||
<synopsis>
|
||||
Netkit FTP Server contains a Denial of Service vulnerability.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200801-20">
|
||||
<title>libxml2: Denial of Service</title>
|
||||
<title>libxml2: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability has been reported in libxml2.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200802-08">
|
||||
<title>Boost: Denial of Service</title>
|
||||
<title>Boost: Denial of service</title>
|
||||
<synopsis>
|
||||
Two vulnerabilities have been reported in Boost, each one possibly
|
||||
resulting in a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200803-22">
|
||||
<title>LIVE555 Media Server: Denial of Service</title>
|
||||
<title>LIVE555 Media Server: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability has been reported in LIVE555 Media
|
||||
Server.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200803-32">
|
||||
<title>Wireshark: Denial of Service</title>
|
||||
<title>Wireshark: Denial of service</title>
|
||||
<synopsis>
|
||||
Multiple Denial of Service vulnerabilities have been discovered in
|
||||
Wireshark.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200804-02">
|
||||
<title>bzip2: Denial of Service</title>
|
||||
<title>bzip2: Denial of service</title>
|
||||
<synopsis>
|
||||
A buffer overread vulnerability has been discovered in Bzip2.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200804-19">
|
||||
<title>PHP Toolkit: Data disclosure and Denial of Service</title>
|
||||
<title>PHP Toolkit: Data disclosure and Denial of service</title>
|
||||
<synopsis>
|
||||
PHP Toolkit does not quote parameters, allowing for PHP source code
|
||||
disclosure on Apache, and a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200804-26">
|
||||
<title>Openfire: Denial of Service</title>
|
||||
<title>Openfire: Denial of service</title>
|
||||
<synopsis>
|
||||
A design error in Openfire might lead to a Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200805-05">
|
||||
<title>Wireshark: Denial of Service</title>
|
||||
<title>Wireshark: Denial of service</title>
|
||||
<synopsis>
|
||||
Multiple Denial of Service vulnerabilities have been discovered in
|
||||
Wireshark.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200805-08">
|
||||
<title>InspIRCd: Denial of Service</title>
|
||||
<title>InspIRCd: Denial of service</title>
|
||||
<synopsis>
|
||||
A buffer overflow in InspIRCd allows remote attackers to cause a Denial of
|
||||
Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200805-15">
|
||||
<title>libid3tag: Denial of Service</title>
|
||||
<title>libid3tag: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability was found in libid3tag.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200806-08">
|
||||
<title>OpenSSL: Denial of Service</title>
|
||||
<title>OpenSSL: Denial of service</title>
|
||||
<synopsis>
|
||||
Two vulnerabilities might allow for a Denial of Service of daemons using
|
||||
OpenSSL.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200807-06">
|
||||
<title>Apache: Denial of Service</title>
|
||||
<title>Apache: Denial of service</title>
|
||||
<synopsis>
|
||||
Multiple vulnerabilities in Apache might lead to a Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200808-04">
|
||||
<title>Wireshark: Denial of Service</title>
|
||||
<title>Wireshark: Denial of service</title>
|
||||
<synopsis>
|
||||
Multiple Denial of Service vulnerabilities have been discovered in
|
||||
Wireshark.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200808-05">
|
||||
<title>ISC DHCP: Denial of Service</title>
|
||||
<title>ISC DHCP: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability was discovered in ISC DHCP.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200809-09">
|
||||
<title>Postfix: Denial of Service</title>
|
||||
<title>Postfix: Denial of service</title>
|
||||
<synopsis>
|
||||
A memory leak in Postfix might allow local users to cause a Denial of
|
||||
Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200809-11">
|
||||
<title>HAVP: Denial of Service</title>
|
||||
<title>HAVP: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability has been reported in HAVP.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200812-03">
|
||||
<title>IPsec-Tools: racoon Denial of Service</title>
|
||||
<title>IPsec-Tools: racoon Denial of service</title>
|
||||
<synopsis>
|
||||
IPsec-Tools' racoon is affected by a remote Denial of Service
|
||||
vulnerability.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200901-04">
|
||||
<title>D-Bus: Denial of Service</title>
|
||||
<title>D-Bus: Denial of service</title>
|
||||
<synopsis>
|
||||
An error condition can cause D-Bus to crash.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200901-11">
|
||||
<title>Avahi: Denial of Service</title>
|
||||
<title>Avahi: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability has been discovered in Avahi.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200901-15">
|
||||
<title>Net-SNMP: Denial of Service</title>
|
||||
<title>Net-SNMP: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability in Net-SNMP could lead to a Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200903-13">
|
||||
<title>MPFR: Denial of Service</title>
|
||||
<title>MPFR: Denial of service</title>
|
||||
<synopsis>
|
||||
Multiple buffer overflows in MPFR might lead to a Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200903-19">
|
||||
<title>Xerces-C++: Denial of Service</title>
|
||||
<title>Xerces-C++: Denial of service</title>
|
||||
<synopsis>
|
||||
An error in Xerces-C++ allows for a Denial of Service via malicious XML
|
||||
schema files.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200903-40">
|
||||
<title>Analog: Denial of Service</title>
|
||||
<title>Analog: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service vulnerability was discovered in Analog.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200904-04">
|
||||
<title>WeeChat: Denial of Service</title>
|
||||
<title>WeeChat: Denial of service</title>
|
||||
<synopsis>
|
||||
A processing error in WeeChat might lead to a Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200904-08">
|
||||
<title>OpenSSL: Denial of Service</title>
|
||||
<title>OpenSSL: Denial of service</title>
|
||||
<synopsis>
|
||||
An error in OpenSSL might allow for a Denial of Service when printing
|
||||
certificate details.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200904-10">
|
||||
<title>Avahi: Denial of Service</title>
|
||||
<title>Avahi: Denial of service</title>
|
||||
<synopsis>
|
||||
An error in Avahi might lead to a Denial of Service via network and CPU
|
||||
consumption.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200904-13">
|
||||
<title>Ventrilo: Denial of Service</title>
|
||||
<title>Ventrilo: Denial of service</title>
|
||||
<synopsis>
|
||||
A vulnerability has been discovered in Ventrilo, allowing for a Denial of
|
||||
Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200905-03">
|
||||
<title>IPSec Tools: Denial of Service</title>
|
||||
<title>IPSec Tools: Denial of service</title>
|
||||
<synopsis>
|
||||
Multiple errors in the IPSec Tools racoon daemon might allow remote
|
||||
attackers to cause a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200905-06">
|
||||
<title>acpid: Denial of Service</title>
|
||||
<title>acpid: Denial of service</title>
|
||||
<synopsis>
|
||||
An error in acpid might allow remote attackers to cause a Denial of
|
||||
Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200906-02">
|
||||
<title>Ruby: Denial of Service</title>
|
||||
<title>Ruby: Denial of service</title>
|
||||
<synopsis>
|
||||
A flaw in the Ruby standard library might allow remote attackers to cause a
|
||||
Denial of Service attack.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200907-02">
|
||||
<title>ModSecurity: Denial of Service</title>
|
||||
<title>ModSecurity: Denial of service</title>
|
||||
<synopsis>
|
||||
Two vulnerabilities in ModSecurity might lead to a Denial of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200907-05">
|
||||
<title>git: git-daemon Denial of Service</title>
|
||||
<title>git: git-daemon Denial of service</title>
|
||||
<synopsis>
|
||||
An error in git-daemon might lead to a Denial of Service via resource
|
||||
consumption.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200908-02">
|
||||
<title>BIND: Denial of Service</title>
|
||||
<title>BIND: Denial of service</title>
|
||||
<synopsis>
|
||||
Dynamic Update packets can cause a Denial of Service in the BIND daemon.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200908-07">
|
||||
<title>Perl Compress::Raw modules: Denial of Service</title>
|
||||
<title>Perl Compress::Raw modules: Denial of service</title>
|
||||
<synopsis>
|
||||
An off-by-one error in Compress::Raw::Zlib and Compress::Raw::Bzip2 might
|
||||
lead to a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200908-08">
|
||||
<title>ISC DHCP: dhcpd Denial of Service</title>
|
||||
<title>ISC DHCP: dhcpd Denial of service</title>
|
||||
<synopsis>
|
||||
dhcpd as included in the ISC DHCP implementation does not properly handle
|
||||
special conditions, leading to a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200909-05">
|
||||
<title>Openswan: Denial of Service</title>
|
||||
<title>Openswan: Denial of service</title>
|
||||
<synopsis>
|
||||
Multiple vulnerabilities in the pluto IKE daemon of Openswan might allow
|
||||
remote attackers to cause a Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="200909-16">
|
||||
<title>Wireshark: Denial of Service</title>
|
||||
<title>Wireshark: Denial of service</title>
|
||||
<synopsis>
|
||||
Multiple vulnerabilities have been discovered in Wireshark which allow for
|
||||
Denial of Service.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201001-01">
|
||||
<title>NTP: Denial of Service</title>
|
||||
<title>NTP: Denial of service</title>
|
||||
<synopsis>
|
||||
A Denial of Service condition in ntpd can cause excessive CPU or bandwidth
|
||||
consumption.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201006-17">
|
||||
<title>lighttpd: Denial of Service</title>
|
||||
<title>lighttpd: Denial of service</title>
|
||||
<synopsis>
|
||||
A processing error in lighttpd might result in a Denial of Service
|
||||
condition.
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201009-07">
|
||||
<title>libxml2: Denial of Service</title>
|
||||
<title>libxml2: Denial of service</title>
|
||||
<synopsis>
|
||||
Multiple Denial of Services vulnerabilities were found in libxml2.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201110-07">
|
||||
<title>vsftpd: Denial of Service</title>
|
||||
<title>vsftpd: Denial of service</title>
|
||||
<synopsis>A Denial of Service vulnerability was found in vsftpd.</synopsis>
|
||||
<product type="ebuild">vsftpd</product>
|
||||
<announced>2011-10-10</announced>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201110-12">
|
||||
<title>Unbound: Denial of Service</title>
|
||||
<title>Unbound: Denial of service</title>
|
||||
<synopsis>Multiple Denial of Service vulnerabilities were found in Unbound.</synopsis>
|
||||
<product type="ebuild">unbound</product>
|
||||
<announced>2011-10-15</announced>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201110-17">
|
||||
<title>Avahi: Denial of Service</title>
|
||||
<title>Avahi: Denial of service</title>
|
||||
<synopsis>Multiple vulnerabilities were found in Avahi, allowing for Denial
|
||||
of Service.
|
||||
</synopsis>
|
||||
|
@ -1,7 +1,7 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201202-03">
|
||||
<title>MaraDNS: Denial of Service</title>
|
||||
<title>MaraDNS: Denial of service</title>
|
||||
<synopsis>A hash collision vulnerability in MaraDNS allows remote attackers
|
||||
to cause a Denial of Service condition.
|
||||
</synopsis>
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user