Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Mar 2015 21:32:04 +0000 (UTC)
From:      Brooks Davis <brooks@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r382177 - head/security/vuxml
Message-ID:  <201503242132.t2OLW4hH013602@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: brooks
Date: Tue Mar 24 21:32:04 2015
New Revision: 382177
URL: https://svnweb.freebsd.org/changeset/ports/382177
QAT: https://qat.redports.org/buildarchive/r382177/

Log:
  The ancient version of binutils in the cross-binutils port suffers for
  several vulnerabilities.
  
  This also effects devel/mingw64-binutils.
  
  PR:		198816
  Reported by:	Sevan Janiyan <venture37@geeklan.co.uk>

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Mar 24 21:26:18 2015	(r382176)
+++ head/security/vuxml/vuln.xml	Tue Mar 24 21:32:04 2015	(r382177)
@@ -57,6 +57,56 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="f6a014cd-d268-11e4-8339-001e679db764">
+    <topic>GNU binutils -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>devel/cross-binutils</name>
+	<range><lt>2.25</lt></range>
+      </package>
+      <package>
+	<name>devel/mingw64-binutils</name>
+	<range><lt>2.25</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>US-CERT/NIST reports:</p>
+	<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501">;
+	  <p>The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU
+	  binutils 2.24 and earlier allows remote attackers to cause a
+	  denial of service (out-of-bounds write) and possibly have other
+	  unspecified impact via a crafted NumberOfRvaAndSizes field in the
+	  AOUT header in a PE executable.</p>
+	</blockquote>
+	<p>US-CERT/NIST reports:</p>
+	<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502">;
+	  <p>Heap-based buffer overflow in the pe_print_edata function in
+	  bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
+	  attackers to cause a denial of service (crash) and possibly have
+	  other unspecified impact via a truncated export table in a PE
+	  file.</p>
+	</blockquote>
+	<p>US-CERT/NIST reports:</p>
+	<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503">;
+	  <p>Stack-based buffer overflow in the ihex_scan function in
+	  bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
+	  attackers to cause a denial of service (crash) and possibly have
+	  other unspecified impact via a crafted ihex file.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501</url>;
+      <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502</url>;
+      <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503</url>;
+    </references>
+    <dates>
+      <discovery>2014-12-09</discovery>
+      <entry>2015-03-24</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="996bce94-d23d-11e4-9463-9cb654ea3e1c">
     <topic>libuv -- incorrect revocation order while relinquishing privileges</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201503242132.t2OLW4hH013602>