Date: Sun, 9 Mar 2014 08:43:48 +0000 (UTC) From: Koop Mast <kwm@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r347557 - head/security/vuxml Message-ID: <201403090843.s298hmPk046409@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: kwm Date: Sun Mar 9 08:43:48 2014 New Revision: 347557 URL: http://svnweb.freebsd.org/changeset/ports/347557 QAT: https://qat.redports.org/buildarchive/r347557/ Log: Unbreak vuxml. Submitted by: battlez MFH: 2014Q1 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Mar 9 08:33:39 2014 (r347556) +++ head/security/vuxml/vuln.xml Sun Mar 9 08:43:48 2014 (r347557) @@ -63,7 +63,7 @@ Note: Please add new entries to the beg <body xmlns="http://www.w3.org/1999/xhtml"> <p>Mateusz Jurczyk reports:</p> <blockquote cite="http://savannah.nongnu.org/bugs/?41697"> - <p>Out of bounds stack-based read/write in cf2_hintmap_build.<br> + <p>Out of bounds stack-based read/write in cf2_hintmap_build. This is a critical vulnerability in the CFF Rasterizer code recently contributed by Adobe, leading to potential arbitrary code execution in the context of the FreeType2 library client.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403090843.s298hmPk046409>