From owner-svn-ports-head@FreeBSD.ORG Tue Mar 24 22:15:49 2015 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id B3DEC6A9; Tue, 24 Mar 2015 22:15:49 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 978DCA1; Tue, 24 Mar 2015 22:15:49 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t2OMFnrr034851; Tue, 24 Mar 2015 22:15:49 GMT (envelope-from zi@FreeBSD.org) Received: (from zi@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t2OMFnWK034850; Tue, 24 Mar 2015 22:15:49 GMT (envelope-from zi@FreeBSD.org) Message-Id: <201503242215.t2OMFnWK034850@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: zi set sender to zi@FreeBSD.org using -f From: Ryan Steinmetz Date: Tue, 24 Mar 2015 22:15:49 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r382184 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 24 Mar 2015 22:15:49 -0000 Author: zi Date: Tue Mar 24 22:15:48 2015 New Revision: 382184 URL: https://svnweb.freebsd.org/changeset/ports/382184 QAT: https://qat.redports.org/buildarchive/r382184/ Log: - Fix vuxml build: bad package names in f6a014cd-d268-11e4-8339-001e679db764 - Fix blockquote style to match rest Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Mar 24 21:55:15 2015 (r382183) +++ head/security/vuxml/vuln.xml Tue Mar 24 22:15:48 2015 (r382184) @@ -61,11 +61,11 @@ Notes: GNU binutils -- multiple vulnerabilities - devel/cross-binutils + cross-binutils 2.25 - devel/mingw64-binutils + mingw64-binutils 2.25 @@ -74,29 +74,32 @@ Notes:

US-CERT/NIST reports:

The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU - binutils 2.24 and earlier allows remote attackers to cause a - denial of service (out-of-bounds write) and possibly have other - unspecified impact via a crafted NumberOfRvaAndSizes field in the - AOUT header in a PE executable.

+ binutils 2.24 and earlier allows remote attackers to cause a + denial of service (out-of-bounds write) and possibly have other + unspecified impact via a crafted NumberOfRvaAndSizes field in the + AOUT header in a PE executable.

US-CERT/NIST reports:

Heap-based buffer overflow in the pe_print_edata function in - bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote - attackers to cause a denial of service (crash) and possibly have - other unspecified impact via a truncated export table in a PE - file.

+ bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote + attackers to cause a denial of service (crash) and possibly have + other unspecified impact via a truncated export table in a PE + file.

US-CERT/NIST reports:

Stack-based buffer overflow in the ihex_scan function in - bfd/ihex.c in GNU binutils 2.24 and earlier allows remote - attackers to cause a denial of service (crash) and possibly have - other unspecified impact via a crafted ihex file.

+ bfd/ihex.c in GNU binutils 2.24 and earlier allows remote + attackers to cause a denial of service (crash) and possibly have + other unspecified impact via a crafted ihex file.

+ CVE-2014-8501 + CVE-2014-8502 + CVE-2014-8503 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503